Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Algorithm on Online Clustering of Bandits., , , and . IJCAI, page 2923-2929. ijcai.org, (2019)Research on Simulation of Credit Risk of Credit Card based on Multi-Agent., , , and . ITQM, volume 31 of Procedia Computer Science, page 517-522. Elsevier, (2014)High-Performance and Lightweight Transaction Support in Flash-Based SSDs., , , , and . IEEE Trans. Computers, 64 (10): 2819-2832 (2015)Automatic non-parametric image parsing via hierarchical semantic voting based on sparse-dense reconstruction and spatial-contextual cues., , , and . Neurocomputing, (2016)LightTx: A lightweight transactional design in flash-based SSDs to support flexible transactions., , , , and . ICCD, page 115-122. IEEE Computer Society, (2013)Online Clustering of Contextual Cascading Bandits., and . CoRR, (2017)A fully trainable network with RNN-based pooling., , , , and . Neurocomputing, (2019)Humanized Game Design Based on Augmented Reality., , and . ICSI (2), volume 8795 of Lecture Notes in Computer Science, page 284-291. Springer, (2014)Deep Independently Recurrent Neural Network (IndRNN)., , , , and . CoRR, (2019)New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server., , , , , and . ICC, page 1-6. IEEE, (2018)