Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outlier Robust ICP for Minimizing Fractional RMSD, , and . CoRR, (2006)A memetic algorithm for optimization of combination chemotherapy with dose adjustment., , and . CASE, page 207-212. IEEE, (2017)Enhanced VIP Algorithms for Forwarding, Caching, and Congestion Control in Named Data Networks., , , and . GLOBECOM, page 1-7. IEEE, (2016)Beyond Log Files: Using Multi-Modal Data Streams Towards Data-Driven KC Model Improvement., , and . EDM, page 436-441. International Educational Data Mining Society (IEDMS), (2016)Study on Virtual Camera with Preset Shot Types Based on Composition Aesthetic Computing., and . Trans. Edutainment, (2017)Systematic Review of Dynamic Multi-Object Identification and Localization: Techniques and Technologies., , , , and . IEEE Access, (2021)EasyAPPos: Positioning Wi-Fi Access Points by Using a Mobile Phone., , , , and . IEEE Internet Things J., 10 (15): 13385-13400 (August 2023)SSMalloc: a low-latency, locality-conscious memory allocator with stable performance scalability., and . APSys, page 15. ACM, (2012)A Two-Factor Authentication Scheme based on Negative Databases., , and . SSCI, page 1110-1115. IEEE, (2018)Reconstructing positive surveys from negative surveys by improved artificial immune network., , and . SSCI, page 1116-1121. IEEE, (2018)