Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Design of the Event Trigger for Android Application., , and . QSHINE, volume 199 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 426-434. Springer, (2016)Clinical element models in the SHARPn consortium., , , , , , , , , and 1 other author(s). JAMIA, 23 (2): 248-256 (2016)An Intrusion Plan Recognition Algorithm Based on Max-1-Connected Causal Networks., and . International Conference on Computational Science (4), volume 4490 of Lecture Notes in Computer Science, page 809-816. Springer, (2007)The Design and Implementation of a Picklist Authoring Tool., , and . AMIA, AMIA, (2003)基于签名与数据流模式挖掘的Android恶意软件检测系统 (Android Static Analysis System Based on Signature and Data Flow Pattern Mining)., , , and . 计算机科学, 44 (Z11): 317-321 (2017)A Sampling Method for Intrusion Detection System., and . APNOMS, volume 5297 of Lecture Notes in Computer Science, page 419-428. Springer, (2008)Data Modeling for Incorporating Consumer-Entered Family Health History Data into the Electronic Health Record., , , , , , , and . AMIA, AMIA, (2012)