Author of the publication

Research and Implement of Real-Time Data Loading System IMIL.

, , and . WISE Workshops, volume 4256 of Lecture Notes in Computer Science, page 133-144. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Implement of Security Situation Awareness System YH-SSAS., , and . ISCTCS, volume 320 of Communications in Computer and Information Science, page 721-729. Springer, (2012)Imbalanced Chinese Text Classification Based on Weighted Sampling., , , and . ISCTCS, volume 426 of Communications in Computer and Information Science, page 38-45. Springer, (2013)A Top K Relative Outlier Detection Algorithm in Uncertain Datasets., , and . APWeb, volume 8709 of Lecture Notes in Computer Science, page 36-47. Springer, (2014)Malicious mining code detection based on ensemble learning in cloud computing environment., , , , , and . Simul. Model. Pract. Theory, (2021)Analyzing Security Attacks Against Platoon of Intelligent and Connected Vehicles., , , , and . DSC, page 76-81. IEEE, (2023)A Consistent Hashing Based Data Redistribution Algorithm., , and . IScIDE (2), volume 9243 of Lecture Notes in Computer Science, page 559-566. Springer, (2015)Middleware Based Context Management for the Component-Based Pervasive Computing., , , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 71-81. Springer, (2007)Sockpuppet gang detection on social media sites., , , and . Frontiers Comput. Sci., 10 (1): 124-135 (2016)A New K-anonymity Algorithm towards Multiple Sensitive Attributes., , and . CIT, page 768-772. IEEE Computer Society, (2012)Research on Large Scale Hierarchical Classification Based on Candidate Search., , , and . IEEE WISA, page 355-360. IEEE Computer Society, (2013)