Author of the publication

Modeling Object Flows from Distributed and Federated RFID Data Streams for Efficient Tracking and Tracing.

, , , and . IEEE Trans. Parallel Distributed Syst., 24 (10): 2036-2045 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The development of object-oriented knowledge base and adaptive motion planning for autonomous mobile robots., , and . IROS, page 108-113. IEEE, (2001)The Redundant PB-tree., , and . Parallel and Distributed Computing and Systems, page 344-351. IASTED/ACTA Press, (1995)Community-based influence maximization for viral marketing., , , , and . Appl. Intell., 49 (6): 2137-2150 (2019)The Framework of Relative Density-Based Clustering., and . PAAP, volume 729 of Communications in Computer and Information Science, page 343-352. Springer, (2017)A Selectively Re-train Approach Based on Clustering to Classify Concept-Drifting Data Streams with Skewed Distribution., , , , , and . PAKDD (2), volume 8444 of Lecture Notes in Computer Science, page 413-424. Springer, (2014)A New Evaluation Function for Entropy-Based Feature Selection from Incomplete Data., , , , and . PAKDD (2), volume 8444 of Lecture Notes in Computer Science, page 98-109. Springer, (2014)Towards Identity Disclosure Control in Private Hypergraph Publishing., and . PAKDD (2), volume 7302 of Lecture Notes in Computer Science, page 347-358. Springer, (2012)Self-projecting Time Series Forecast - An Online Stock Trend Forecast System ., and . ISPA, volume 2745 of Lecture Notes in Computer Science, page 28-43. Springer, (2003)An Adaptive Method of Numerical Attribute Merging for Quantitative Association Rule Mining., , and . ICSC, volume 1749 of Lecture Notes in Computer Science, page 41-50. Springer, (1999)A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection., and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 178-191. Springer, (2005)