Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iSAX 2.0: Indexing and Mining One Billion Time Series., , , and . ICDM, page 58-67. IEEE Computer Society, (2010)iSAX: disk-aware mining and indexing of massive time series datasets., and . Data Min. Knowl. Discov., 19 (1): 24-57 (2009)Polishing the Right Apple: Anytime Classification Also Benefits Data Streams with Constant Arrival Times., and . ICDM, page 461-470. IEEE Computer Society, (2010)iSAX: indexing and mining terabyte sized time series., and . KDD, page 623-631. ACM, (2008)A Self-tuning Emergency Model of Home Network Environment., , , , and . IEA/AIE, volume 4031 of Lecture Notes in Computer Science, page 1111-1118. Springer, (2006)Fuzzy System Reliability Analysis Using Triangular Fuzzy Numbers Based on Statistical Data., , and . J. Inf. Sci. Eng., 24 (5): 1521-1535 (2008)Fuzzy inventory with backorder for fuzzy total demand based on interval-valued fuzzy set., and . Eur. J. Oper. Res., 124 (2): 390-408 (2000)Discovering Traffic Bottlenecks in an Urban Network by Spatiotemporal Data Mining on Location-Based Services., , , and . IEEE Trans. Intell. Transp. Syst., 12 (4): 1047-1056 (2011)Fuzzy inventory without backorder for fuzzy order quantity and fuzzy total demand quantity., , and . Comput. Oper. Res., 27 (10): 935-962 (2000)An analysis of trusted service manager development modes by mobile operating system designers in Taiwan., , , and . Electron. Commer. Res. Appl., 14 (6): 592-602 (2015)