Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Processing of Range-Monitoring Queries in Heterogeneous Mobile Databases., , , and . IEEE Trans. Mob. Comput., 5 (7): 931-942 (2006)Policy to cope with deadlocks and livelocks for flexible manufacturing systems using the max′-controlled new smart siphons, , , , , , and . Control Theory & Applications, IET, 8 (16): 1607--1616 (2014)DPSAF: Forward Prediction Based Dynamic Packet Scheduling and Adjusting With Feedback for Multipath TCP in Lossy Heterogeneous Networks., , , , , , and . IEEE Trans. Vehicular Technology, 67 (2): 1521-1534 (2018)Scenario Driven Lifecycle Automation of Net-Centric Simulation., , , , and . AsiaSim (2), volume 324 of Communications in Computer and Information Science, page 413-420. Springer, (2012)Face attribute prediction with convolutional neural networks., , , , and . ROBIO, page 1294-1299. IEEE, (2017)Caching collaboration and cache allocation in peer-to-peer video systems, , and . Multimedia Tools Appl., 37 (2): 117--134 (2008)The Analysis and Optimization of KNN Algorithm Space-Time Efficiency for Chinese Text Categorization., and . CSEE (1), volume 214 of Communications in Computer and Information Science, page 542-550. Springer, (2011)Spatio-Temporal Check-in Time Prediction with Recurrent Neural Network based Survival Analysis., , and . IJCAI, page 2976-2983. ijcai.org, (2018)Multiclass classification based on a deep convolutional network for head pose estimation., , and . Frontiers Inf. Technol. Electron. Eng., 16 (11): 930-939 (2015)Feeling-based location privacy protection for location-based services., and . ACM Conference on Computer and Communications Security, page 348-357. ACM, (2009)