Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enterprise After-Sales Management System Based on J2EE., , and . ICICA (2), volume 392 of Communications in Computer and Information Science, page 498-507. Springer, (2013)Specification and enforcement of flexible security policy for active cooperation., , , , and . Inf. Sci., 179 (15): 2629-2642 (2009)Integrating constraints to support legally flexible business processes., , and . Inf. Syst. Frontiers, 13 (2): 171-189 (2011)Understanding Expert Knowledge for Chinese Essay Grading., , , and . ChineseCSCW (1), volume 1491 of Communications in Computer and Information Science, page 488-501. Springer, (2021)Collaboratively Learning Latent Factors and Correlations for New Paper Influence Predication., , and . CSCWD, page 4-9. IEEE, (2018)Modeling User Intrinsic Characteristic on Social Media for Identity Linkage., , , and . GROUP, page 39-50. ACM, (2018)Predicating paper influence in academic network., , and . CSCWD, page 539-544. IEEE, (2016)PRES: a practical flexible RBAC workflow system., and . ICEC, volume 113 of ACM International Conference Proceeding Series, page 653-658. ACM, (2005)An Approach for Trusted Interoperation in a Multidomain Environment., , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 352-361. Springer, (2006)Iteratively Calibrating Prompts for Unsupervised Diverse Opinion Summarization., , , , and . ECAI, volume 392 of Frontiers in Artificial Intelligence and Applications, page 3939-3946. IOS Press, (2024)