Author of the publication

Application of Community Detection Algorithms on Social Internet-of-things Networks.

, , , and . ICM, page 94-97. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel SOR Iterative Algorithms and Performance Evaluation on a Linux Cluster., , , and . PDPTA, page 263-269. CSREA Press, (2005)Value-Based Processes for COTS-Based Applications., , , and . IEEE Software, 22 (4): 54-62 (2005)A simplified algorithm of JPEG2000 rate control for VLSI implementation., , , and . ISCAS (6), page 6316-6319. IEEE, (2005)The more Product Complexity, the more Actual Effort? An Empirical Investigation into Software Developments., , and . CoRR, (2015)Scalable aggregation on multicore processors., , and . DaMoN, page 1-9. ACM, (2011)Influencing factors of defect removal: an empirical study based on industrial data., , , and . ESEM, ACM, (2010)Study on the Game Relationship Between Online-Taxi and Traditional Taxi Under the Taxi-Hailing Apps., , and . CSPS, volume 463 of Lecture Notes in Electrical Engineering, page 1639-1649. Springer, (2017)Software Crowdsourcing Design: An Experiment on the Relationship Between Task Design and Crowdsourcing Performance., , , and . HCI (45), volume 12427 of Lecture Notes in Computer Science, page 3-27. Springer, (2020)Attribute-based anonymous credential: Delegation, traceability, and revocation., , , , , , and . Comput. Networks, (December 2023)A Fuzzy-Based Method for Evaluating the Trustworthiness of Software Processes., , , , and . ICSP, volume 6195 of Lecture Notes in Computer Science, page 297-308. Springer, (2010)