Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing a Controlled Language for the Machine Translation of Medical Protocols: The Case of English to Chinese., , and . AMTA, volume 3265 of Lecture Notes in Computer Science, page 37-47. Springer, (2004)Worm Harm Prediction Based on Segment Procedure Neural Networks., and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 383-388. Springer, (2006)Influence maximization algorithm based on cross propagation in location-based social networks., , and . Wirel. Networks, 26 (7): 5035-5046 (2020)An Overlapped Community Partition Algorithm Based on Line Graph., , , and . WAIM, volume 7923 of Lecture Notes in Computer Science, page 277-281. Springer, (2013)A Bayesian network-based model for risk modeling and scenario deduction of collision accidents of inland intelligent ships., , , , and . Reliab. Eng. Syst. Saf., (March 2024)An Open Approach for the Applied Pi Calculus., , and . J. Softw., 3 (9): 44-51 (2008)Segment procedure neural networks., and . GrC, page 526-529. IEEE, (2005)Texture-intensity-based fast coding unit size determination method for high-efficiency video coding intracoding., , , and . J. Electronic Imaging, 23 (5): 053005 (2014)Game Analysis of Workload Factoring with the Hybrid Cloud., , and . CANDAR, page 263-269. IEEE Computer Society, (2013)Realization of the Chinese BA-construction in an English-Chinese Machine Translation System., , and . SIGHAN@COLING/ACL, page 79-86. Association for Computational Linguistics, (2006)