Author of the publication

A Set-Covering-Based Approach for Overlapping Resource Selection in Distributed Information Retrieval.

, and . CSIE (4), page 272-276. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Research for Spatial Role-Based Access Control Model., , , and . ICCSA (4), volume 6019 of Lecture Notes in Computer Science, page 296-308. Springer, (2010)An Improved PSO Algorithm Encoding a priori Information for Nonlinear Approximation., , and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 223-231. Springer, (2009)Research and implementation of graphic service grid system., , , and . CSCWD (1), page 334-338. IEEE Computer Society, (2005)Gene Selection and PSO-BP Classifier Encoding a Prior Information., , and . ICSI (2), volume 6146 of Lecture Notes in Computer Science, page 335-342. Springer, (2010)The Dilemma of Covert Channels Searching., and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 169-174. Springer, (2005)Interpreting system for visual query language CQL., , , and . ICIG, page 564-567. IEEE Computer Society, (2004)Extensible Motor of a Object-Relational DBMS: Design and Implementation., , and . TOOLS (31), page 372-379. IEEE Computer Society, (1999)Information Flow Graph: An Approach to Identifying Covert Storage Channels., , , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 87-97. Springer, (2010)Research of Hot-Spot Selection Algorithm in Virtual Address Switch., , , and . ISPA Workshops, volume 3759 of Lecture Notes in Computer Science, page 111-119. Springer, (2005)On the Formal Characterization of Covert Channel., and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 155-160. Springer, (2004)