Author of the publication

Schema-Driven Security Filter Generation For Distributed Data Integration.

, , , and . HotWeb, page 1-6. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast black-box quantum state preparation based on linear combination of unitaries., , , , , , , , and . Quantum Inf. Process., 20 (8): 1-14 (2021)MRI brain image segmentation by adaptive spatial deterministic annealing clustering., , and . ISBI, page 299-302. IEEE, (2006)Edge-Guided Near-Eye Image Analysis for Head Mounted Displays., , , and . ISMAR, page 11-20. IEEE, (2021)Chinese Noun Phrase Metaphor Recognition with Maximum Entropy Approach., , , , and . CICLing, volume 3878 of Lecture Notes in Computer Science, page 235-244. Springer, (2006)Segmentation of liver and liver tumor for the Liver-Workbench., , , , , , , and . Medical Imaging: Image Processing, volume 7962 of SPIE Proceedings, page 79622I. SPIE, (2011)A fuzzy clustering vessel segmentation method incorporating line-direction information., , , , and . Medical Imaging: Image Processing, volume 8314 of SPIE Proceedings, page 83143I. SPIE, (2012)Detection Performance of Packet Arrival under Downclocking for Mobile Edge Computing., , , , and . Wirel. Commun. Mob. Comput., (2018)Estimation of Above-Ground Biomass of Winter Wheat Based on Consumer-Grade Multi-Spectral UAV., , , , , , , , , and 1 other author(s). Remote. Sens., 14 (5): 1251 (2022)The Impacts of Reactive Aggression and Friendship Quality on Cyberbullying Behaviour: An Advancement of Cyclic Process Model., , , , and . Int. J. Cyber Behav. Psychol. Learn., 7 (2): 49-71 (2017)A Comparative Analysis of Chinese Simile and Metaphor Based on a Large Scale Chinese Corpus., , and . CCL, volume 9427 of Lecture Notes in Computer Science, page 77-88. Springer, (2015)