Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation of Academic News Recommendation System Based on User Profile and Message Semantics., , , , and . ISICA (1), volume 873 of Communications in Computer and Information Science, page 531-540. Springer, (2017)Efficient Retrieval of 3D Models Based on Integer Medial Axis Skeleton., and . ICAT, volume 4282 of Lecture Notes in Computer Science, page 830-838. Springer, (2006)Modeling the Impacts of WiFi Signals on Energy Consumption of Smartphones., , and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 88-97. Springer, (2017)Research of Improved Particle Swarm Optimization Based on Genetic Algorithm for Hadoop Task Scheduling Problem., and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 829-834. Springer, (2015)Study of AD HOC Network Access Single-Channel MAC Protocol and Hidden/Exposed Terminal., and . WGEC, page 689-692. IEEE Computer Society, (2009)A Method for Latent-Friendship Recommendation Based on Community Detection in Social Network., , , , and . IEEE WISA, page 3-8. IEEE Computer Society, (2015)A New Malware Classification Approach Based on Malware Dynamic Analysis., , , , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 173-189. Springer, (2017)HonIDS: Enhancing Honeypot System with Intrusion Detection Models., , , and . IWIA, page 135-143. IEEE Computer Society, (2006)Concepts, Model and Framework of Cooperative Software Engineering., , , , and . CSCWD (Selected papers), volume 3168 of Lecture Notes in Computer Science, page 76-85. Springer, (2004)Defending against Internet worms: a signature-based approach., and . INFOCOM, page 1384-1394. IEEE, (2005)