Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time constraint route search over multi-locations., , , , and . Knowl. Eng. Rev., 29 (2): 217-233 (2014)Constrained range search query processing on road networks., , , , and . Concurr. Comput. Pract. Exp., 23 (5): 491-504 (2011)Voronoi-based multi-level range search in mobile navigation., , , , and . Multim. Tools Appl., 53 (2): 459-479 (2011)A Locating Approach for Small-Sized Components of Railway Catenary Based on Improved YOLO With Asymmetrically Effective Decoupled Head., , , , , , , and . IEEE Access, (2023)A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata., , , , and . Inf. Sci., (2022)Tiered Random Matching Markets: Rank Is Proportional to Popularity., , , , and . ITCS, volume 185 of LIPIcs, page 46:1-46:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)FedGSL: Federated Graph Structure Learning for Local Subgraph Augmentation., , and . IEEE Big Data, page 818-824. IEEE, (2022)Generalized Synchronization Theorem for Non-Autonomous Differential Equation with Application in Encryption Scheme., , , , and . CIS, page 972-976. IEEE Computer Society, (2007)Network Voronoi Diagram Based Range Search., , , , , and . AINA, page 741-748. IEEE Computer Society, (2009)Cryptanalysis and Improvement of a Chaos-Based Watermarking Scheme., , , and . IEEE Access, (2019)