Author of the publication

Theory of commercial application management system and its implementation - AMPS.

, , , and . Parallel and Distributed Computing and Networks, page 75-83. IASTED/ACTA Press, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theory of commercial application management system and its implementation - AMPS., , , and . Parallel and Distributed Computing and Networks, page 75-83. IASTED/ACTA Press, (2007)Towards Heap-Based Memory Corruption Discovery., , , and . MSN, page 502-511. IEEE, (2021)Coreference Resolution with Syntax and Semantics., , , , , and . WISA, volume 13579 of Lecture Notes in Computer Science, page 181-193. Springer, (2022)DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting., , , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-24. Springer, (2021)AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs., , , , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 510-528. Springer, (2022)Distributed Randomized Sketching Kernel Learning., , and . AAAI, page 8883-8891. AAAI Press, (2022)Lasso Screening for Object Categories Recognition Using Multi-directional Context Features., , and . ISKE, page 434-441. IEEE, (2015)Template-Instance Loss for Offline Handwritten Chinese Character Recognition., , , and . ICDAR, page 315-322. IEEE, (2019)Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection., , , and . ICTAI, page 947-954. IEEE, (2019)AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities., , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 341-356. Springer, (2019)