Author of the publication

A method for accelerating relations search over big data scenario.

, , , and . ACAI, page 29:1-29:6. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvement of one escrow-free identity-based signature., and . WCNIS, page 602-606. IEEE, (2010)Erratum to: "New oscillation criteria for second-order nonlinear neutral delay differential equations" J. Comput. Appl. Math. 231(2009) 657-663., and . J. Comput. Appl. Math., 233 (10): 2755 (2010)A Strong RSA Signature Scheme and Its Application., and . SNPD (1), page 111-115. IEEE Computer Society, (2007)Large-scale patch recommendation at Alibaba., , , , , and . ICSE (Companion Volume), page 252-253. ACM, (2020)Mobile Phone TV Services Business Model Based on Value Co-creation., , and . SRII Global Conference, page 435-439. IEEE Computer Society, (2012)Ballistic missile precessing frequency extraction based on maximum likelihood estimation., , , and . EUSIPCO, page 1562-1566. IEEE, (2010)Preparation and Property Research of Strain Sensor Based on PDMS and Silver Nanomaterials., , , , , , , and . J. Sensors, (2017)Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card., and . IACR Cryptol. ePrint Arch., (2024)Explicit constructions of separating hash families from algebraic curves over finite fields., and . Des. Codes Cryptogr., 41 (2): 221-233 (2006)A Deep Learning Approach to Detection of Warping Forgery in Images., , , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 109-118. Springer, (2020)