Author of the publication

Research on the application of low-polygon design to Chinese chess: -Take the Chinese chess "knight" as an example.

, , and . WSSE, page 199-204. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Simulation Algorithms for Chemical Reactions., , and . BIOCOMP, page 431-436. CSREA Press, (2008)A "Resource Package"-Oriented Approach for Remote Sensing Analysis Modeling - Dust Storm Monitoring Model as Example., , , and . International Journal of Software Engineering and Knowledge Engineering, 24 (5): 731-758 (2014)Risk management in Internet Data Center operations under smart grid environment., , , , and . SmartGridComm, page 384-388. IEEE, (2012)Object-Oriented Network: A Named-Data Architecture Toward the Future Internet., , , and . IEEE Internet of Things Journal, 4 (4): 957-967 (2017)Adaptively Multi-Objective Adversarial Training for Dialogue Generation., , , , and . IJCAI, page 2872-2878. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..QoS-Oriented Wireless Routing for Smart Meter Data Collection: Stochastic Learning on Graph., , , , and . IEEE Trans. Wirel. Commun., 13 (8): 4470-4482 (2014)A Distributed Framework for Task Offloading in Edge Computing Networks of Arbitrary Topology., , , and . IEEE Trans. Wirel. Commun., 19 (4): 2855-2867 (2020)An access model under cloud computing environment., , and . Int. J. Comput. Sci. Eng., 22 (2/3): 328-334 (2020)Detection and fine-grained classification of malicious code using convolutional neural networks and swarm intelligence algorithms., , , , and . Int. J. Wirel. Mob. Comput., 19 (1): 1-8 (2020)DataONE: A Data Federation with Provenance Support., , , , , , , , , and 2 other author(s). IPAW, volume 9672 of Lecture Notes in Computer Science, page 230-234. Springer, (2016)