Author of the publication

The Study of Cross Networks Alarm Correlation Based on Big Data Technology.

, , , , , and . HCC, volume 9567 of Lecture Notes in Computer Science, page 739-745. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An interactive image segmentation method based on dynamic programming and its application in medical image analysis., , , , and . ICPR, page 1558-1560. IEEE Computer Society, (1998)Single Reference Image based Scene Relighting via Material Guided Filtering., , , , , , and . CoRR, (2017)Energy Harvesting Time Coefficient Analyze for Cognitive Radio Sensor Network Using Game Theory., , , , and . HCC, volume 10745 of Lecture Notes in Computer Science, page 318-329. Springer, (2017)A Category Detection Method for Evidence-Based Medicine., , , , and . NLPCC (2), volume 11839 of Lecture Notes in Computer Science, page 665-675. Springer, (2019)A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption., and . DSC, page 187-194. IEEE Computer Society, (2017)A novel energy conversion based method for velocity correction in molecular dynamics simulations., , , and . J. Comput. Phys., (2017)LIRIS-Imagine at ImageCLEF 2011 Photo Annotation Task, , , , and . CLEF (Notebook Papers/Labs/Workshop), (2011)A two-stage multiple-factor aware method for travel product recommendation., , , and . Multimedia Tools Appl., 77 (21): 28991-29012 (2018)Template selection for on-line signature verification., and . ICPR, page 1-4. IEEE Computer Society, (2008)Design of Searchable Algorithm for Biological Databased on Homomorphic Encryption., , , , and . HCC, volume 11956 of Lecture Notes in Computer Science, page 537-545. Springer, (2019)