Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recovering from Malicious Attacks in Workflow Systems., , and . DEXA, volume 3588 of Lecture Notes in Computer Science, page 14-23. Springer, (2005)Reliable Scheduling of Advanced Transactions., , and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 124-138. Springer, (2005)Ensuring Task Dependencies During Workflow Recovery., , and . DEXA, volume 3180 of Lecture Notes in Computer Science, page 24-33. Springer, (2004)PBR: A Personalized Book Resource Recommendation System., , , , and . APWeb/WAIM (1), volume 10987 of Lecture Notes in Computer Science, page 475-479. Springer, (2018)Bounding the role of domestic heating in haze pollution of Beijing based on satellite and surface observations., , and . IGARSS, page 4772-4775. IEEE, (2014)Interactive resource recommendation with optimization by tag association and significance analysis., , , , , and . Neurocomputing, (2020)Deep Bayesian Gaussian Processes for Uncertainty Estimation in Electronic Health Records., , , , , , , , and . CoRR, (2020)Insights on the role of external globus pallidus in controlling absence seizures., , , , , , , and . Neural Networks, (2021)BEHRT: Transformer for Electronic Health Records., , , , , , , and . CoRR, (2019)An estimate of population exposure to automobile source PM2.5 in Beijing using spatiotemporal analysis., , , , and . IGARSS, page 3029-3032. IEEE, (2015)