Author of the publication

Ad Hoc Aggregation Query Processing Algorithms Based on Bit-Store in Data Intensive Cloud.

, , , and . CyberC, page 313-320. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FedMed-ATL: Misaligned Unpaired Cross-Modality Neuroimage Synthesis via Affine Transform Loss., , , , , and . ACM Multimedia, page 1522-1531. ACM, (2022)What Makes a Good Data Augmentation for Few-Shot Unsupervised Image Anomaly Detection?, , , , , , , and . CVPR Workshops, page 4345-4354. IEEE, (2023)Analysis of the Medication Rules for Treating Thyroid Nodules with Ancient Classic Prescriptions Based on Data Mining., , , , , , , , , and . BIBM, page 4655-4661. IEEE, (2023)Answering Spatial Approximate Keyword Queries in Disks., , , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 424-436. Springer, (2015)Automatic Pearl Classification Machine Based on a Multistream Convolutional Neural Network., , , , , , and . IEEE Trans. Ind. Electron., 65 (8): 6538-6547 (2018)Learning Efficient Hash Codes for Fast Graph-Based Data Similarity Retrieval., , , , , and . IEEE Trans. Image Process., (2021)Markerless Body Motion Capturing for 3D Character Animation based on Multi-view Cameras., , and . CoRR, (2022)Towards Continual Adaptation in Industrial Anomaly Detection., , , , , , , and . ACM Multimedia, page 2871-2880. ACM, (2022)Local Information Guided Global Integration for Infrared Small Target Detection., , , , , and . ICASSP, page 4425-4429. IEEE, (2024)Addressing the Threats of Inference Attacks on Traits and Genotypes from Individual Genomic Data., , , , , and . ISBRA, volume 10330 of Lecture Notes in Computer Science, page 223-233. Springer, (2017)