Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Privilege De-Escalation for Ad Libraries in Mobile Apps., , , and . MobiSys, page 89-103. ACM, (2015)The Research on Consolidated Financial Evaluation about Corporate Social Responsibility Based on Fuzzy-AHP., , and . HIS (3), page 447-450. IEEE Computer Society, (2009)Clustering analysis of input and output of science and technology based on feature selection., and . ICMLC, page 654-658. IEEE, (2015)Testing Layered Interconnection Networks., , , and . IEEE Trans. Computers, 53 (6): 710-722 (2004)Design of retrieval system for Web images based on semantic analysis., , , and . FSKD, page 2304-2307. IEEE, (2012)PS-InSAR time series analysis for measuring surface deformation before the L'Aquila earthquake., , , , , and . IGARSS, page 4604-4607. IEEE, (2010)Robust video object tracking using particle filter with likelihood based feature fusion and adaptive template updating., and . CoRR, (2015)Evaluating Universal Quantification in XML., , and . IEEE Trans. Knowl. Data Eng., 19 (11): 1494-1507 (2007)Distributed Cooperative Control Algorithm for Topology Control and Channel Allocation in Multi-radio Multi-channel Wireless Sensor Network: From a Game Perspective., , and . Wireless Personal Communications, 73 (3): 353-379 (2013)An adaptive hash-based multilayer scheduler for L7-filter on a highly threaded hierarchical multi-core server., , , and . ANCS, page 50-59. ACM, (2009)