Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Much Delay Has to Be Tolerated in a Mobile Social Network?, , and . IJDSN, (2013)Recognition of Fetal Facial Ultrasound Standard Plane Based on Texture Feature Fusion., , , , , , and . Comput. Math. Methods Medicine, (2021)Effect of metal line width on electromigration of BEOL Cu interconnects., , , , , , , , , and 1 other author(s). IRPS, page 4. IEEE, (2018)Why Big Data Industrial Systems Need Rules and What We Can Do About It., , , , , , , , , and 2 other author(s). SIGMOD Conference, page 265-276. ACM, (2015)Nash bargaining between friends for cooperative data distribution in a social peer-to-peer swarming system., , , , and . ICMLC, page 1490-1495. IEEE, (2013)Entity Matching Meets Data Science: A Progress Report from the Magellan Project., , , , , , , , , and 10 other author(s). SIGMOD Conference, page 389-403. ACM, (2019)Development of a knowledge-based healthcare-associated infections surveillance system in China., , , , , and . BMC Medical Informatics Decis. Mak., 23 (1): 209 (December 2023)Manually Detecting Errors for Data Cleaning Using Adaptive Crowdsourcing Strategies., , , , and . EDBT, page 311-322. OpenProceedings.org, (2020)A Novel Self-Renewal Hash Chain and Its Implementation., , and . EUC (2), page 144-149. IEEE Computer Society, (2008)978-0-7695-3492-3.Admission Control Strategy of Serving Peers in P2P VoD Systems., , , and . SNPD, page 49-53. IEEE Computer Society, (2012)