Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An admission control algorithm based on matching game and differentiated service in wireless mesh networks., , and . Neural Comput. Appl., 32 (7): 2945-2962 (2020)Performance evaluation of distributed iSCSI RAID., , and . SNAPI@PACT, page 11-18. ACM, (2003)Instrument-tissue Interaction Quintuple Detection in Surgery Videos., , , , , , , and . MICCAI (8), volume 13437 of Lecture Notes in Computer Science, page 399-409. Springer, (2022)Core Matrix Regression and Prediction with Regularization., , , , and . ICAIF, page 291-299. ACM, (2022)Survivable Multi-Level Ad-Hoc Group Operations., and . ICDCS Workshops, page 70-75. IEEE Computer Society, (2003)Structural Dependency Self-attention Based Hierarchical Event Model for Chinese Financial Event Extraction., , , , , , , and . CCKS, volume 1466 of Communications in Computer and Information Science, page 76-88. Springer, (2021)Investigation and Analysis of Corneal Morphology in Young Divers., , , , , , , , and . ICAI (1), volume 2014 of Communications in Computer and Information Science, page 3-12. Springer, (2023)A novel CNN-based match kernel for image retrieval., , and . ICIP, page 2445-2449. IEEE, (2016)An improved meteorological radar data inversion precision algorithm based on constrained evolution strategy., , , and . ICNC, page 640-643. IEEE, (2012)Gender differences in the relationship between internet addiction and depression: A cross-lagged study in Chinese adolescents., , , , and . Comput. Hum. Behav., (2016)