Author of the publication

Research on Instance Driving Teaching Method of Java Study.

, , and . CSEE (3), volume 216 of Communications in Computer and Information Science, page 21-25. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Online Learning for Vulnerability Exploitation Time Prediction., , , , , and . WISE (2), volume 12343 of Lecture Notes in Computer Science, page 252-266. Springer, (2020)Ensemble Classifiers based on Kernel ICA for Cancer Data Classification., , and . BMEI, page 1-5. IEEE, (2009)Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning., , , , , and . World Wide Web, 25 (1): 401-423 (2022)Medical Image Registration via Similarity Measure based on Convolutional Neural Network., , and . Cloudtech, page 1-5. IEEE, (2020)Improving accessibility of the Australian My Health Records while preserving privacy and security of the system., , , , , and . Health Inf. Sci. Syst., 8 (1): 31 (2020)School-Enterprise Cooperative Innovation and Entrepreneurship Courses and Case Library of Emerging Engineering Education., , , , and . Edutainment, volume 11462 of Lecture Notes in Computer Science, page 263-267. Springer, (2018)Research on Instance Driving Teaching Method of Java Study., , and . CSEE (3), volume 216 of Communications in Computer and Information Science, page 21-25. Springer, (2011)Outcome-based school-enterprise cooperative software engineering training., , , , , and . TURC, page 15-20. ACM, (2018)Adaptive Data Sampling Mechanism for Process Object., , , , and . ICA3PP (1), volume 11334 of Lecture Notes in Computer Science, page 257-266. Springer, (2018)A Remote User Authentication Scheme Using Bilinear Pairings and ECC., , , , and . ISDA (2), page 1091-1094. IEEE Computer Society, (2006)