From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Large-Update Primal-Dual Interior-Point Method for Second-Order Cone Programming., , , и . ISNN (1), том 6063 из Lecture Notes in Computer Science, стр. 102-109. Springer, (2010)Dynamic pricing considering strategic customers.. LISS, стр. 1-5. IEEE, (2016)Measuring the uncertainty of RFID data based on particle filter and particle swarm optimization., и . Wirel. Networks, 18 (3): 307-318 (2012)Robust PCA Using Matrix Factorization for Background/Foreground Separation., , , , , и . IEEE Access, (2018)A decomposition method for large-scale box constrained optimization., , , и . Appl. Math. Comput., (2014)Sentiment Analysis Based on Weighted Word2vec and Att-LSTM., , , и . CSAI/ICIMT, стр. 420-424. ACM, (2018)Dynamics analysis of a novel 5-DoF parallel manipulator with couple-constrained wrench., , , , и . Robotica, 36 (10): 1421-1435 (2018)Matrix Factorization for User Behavior Analysis of Location-Based Social Network., , и . WISE Workshops, том 8182 из Lecture Notes in Computer Science, стр. 84-97. Springer, (2013)A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies., , , , , , и . Entropy, 23 (5): 529 (2021)An efficient privacy-preserving data query and dissemination scheme in vehicular cloud., , , , , и . Pervasive Mob. Comput., (2020)