Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Co-Learning Ranking for Query-Based Retrieval., , , , , , and . WISE (1), volume 8180 of Lecture Notes in Computer Science, page 468-477. Springer, (2013)Topic Detection with Locally Weighted Semi-supervised Collective Learning., , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 562-572. Springer, (2017)Dilated Convolutional Networks Incorporating Soft Entity Type Constraints for Distant Supervised Relation Extraction., , , , , and . IJCNN, page 1-7. IEEE, (2019)Can helpful reviews help answer product questions?, , , and . PACIS, page 4. (2020)NLOS aware TOF positioning in WLAN., , and . WCSP, page 1-5. IEEE, (2015)Reconfigurable Antenna Based Blind Interference Alignment over Heterogenous Block Fading Channels., , and . CyberC, page 419-422. IEEE Computer Society, (2015)Association Rules Algorithm Research in Optical Warning System., and . IFITA (3), page 189-192. IEEE Computer Society, (2009)A TDMA-based cooperative MAC scheme for two-way relaying networks., , , and . ICC Workshops, page 571-576. IEEE, (2016)A New Active DDoS Defense System Based on Automatic Learning., , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 249-250. Springer, (2005)Personalized app recommendation based on app permissions., , , , , and . World Wide Web, 21 (1): 89-104 (2018)