Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Large-Update Primal-Dual Interior-Point Method for Second-Order Cone Programming., , , and . ISNN (1), volume 6063 of Lecture Notes in Computer Science, page 102-109. Springer, (2010)Measuring the uncertainty of RFID data based on particle filter and particle swarm optimization., and . Wirel. Networks, 18 (3): 307-318 (2012)Robust PCA Using Matrix Factorization for Background/Foreground Separation., , , , , and . IEEE Access, (2018)An efficient privacy-preserving data query and dissemination scheme in vehicular cloud., , , , , and . Pervasive Mob. Comput., (2020)Sentiment Analysis Based on Weighted Word2vec and Att-LSTM., , , and . CSAI/ICIMT, page 420-424. ACM, (2018)Dynamic pricing considering strategic customers.. LISS, page 1-5. IEEE, (2016)The Data Quality Evaluation that Under the Background of Wisdom City., and . IScIDE (2), volume 9243 of Lecture Notes in Computer Science, page 612-621. Springer, (2015)Day-Ahead Optimization and New Energy Integration Capacity Assessment of Integrated Energy Systems., , , , , , and . iSPEC, page 1-7. IEEE, (2023)A New Non-interior Continuation Method for Second-Order Cone Programming., , , and . CSO (2), page 719-722. IEEE Computer Society, (2009)978-0-7695-3605-7.AI 2000: A Decade of Artificial Intelligence., , , , , , and . WebSci, page 345-354. ACM, (2020)