Author of the publication

Multi-granularity context model for dynamic Web service composition.

, , , , and . J. Netw. Comput. Appl., 34 (1): 312-326 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks., , , , , , and . J. Netw. Comput. Appl., (2014)Semantic Filtering for DDL-Based Service Composition., , , , and . PRICAI, volume 5351 of Lecture Notes in Computer Science, page 778-787. Springer, (2008)Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding., , , , , , , , , and . Int. J. Intell. Syst., 36 (5): 2323-2346 (2021)Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View., , , , , , , , and . J. Comput. Sci. Technol., 36 (5): 1002-1021 (2021)Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems., , , , , , and . IEEE Access, (2017)Tolerance granular computing towards incomplete information system., , , and . Int. J. Granul. Comput. Rough Sets Intell. Syst., 2 (1): 10-22 (2011)Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization., , , , , , and . J. Netw. Comput. Appl., (2014)Curbing collusive cyber-gossips for business brand management., , , , and . Enterp. Inf. Syst., 11 (10): 1457-1461 (2017)A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things., , , , , , and . IEEE Trans. Green Commun. Netw., 5 (2): 645-657 (2021)A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning., , , , and . J. Circuits Syst. Comput., 30 (13): 2150229:1-2150229:21 (2021)