Author of the publication

Software Aging Detection Based on NARX Model.

, and . WISA, page 105-110. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

D-Pro: Dynamic Data Center Operations With Demand-Responsive Electricity Prices in Smart Grid., , , and . IEEE Trans. Smart Grid, 3 (4): 1743-1754 (2012)A Study on Context-aware Privacy Protection for Personal Information., , , , , and . ICCCN, page 1351-1358. IEEE, (2007)A New Method of Network Data Link Troubleshooting., , , and . ISPA, volume 3758 of Lecture Notes in Computer Science, page 890-900. Springer, (2005)Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing., , , and . COMPSAC Workshops, page 115-120. IEEE Computer Society, (2013)LSTM-Based Hierarchical Denoising Network for Android Malware Detection., , and . Secur. Commun. Networks, (2018)Using Potential to Guide Mobile Nodes in Wireless Sensor Networks., , , , and . Ad Hoc Sens. Wirel. Networks, 12 (3-4): 229-251 (2011)What affects the user stickiness of the mainstream media websites in China?, , and . Electron. Commer. Res. Appl., (2018)Power-aware optimization for heterogeneous multi-tier clusters., , and . J. Parallel Distributed Comput., 74 (1): 2005-2015 (2014)Multi-dimensional Index over a Key-Value Store for Semi-structured Data., , and . BigSDM, volume 11473 of Lecture Notes in Computer Science, page 165-175. Springer, (2018)EventDB: A Large-Scale Semi-structured Scientific Data Management System., , , , , , , and . BigSDM, volume 11473 of Lecture Notes in Computer Science, page 105-115. Springer, (2018)