Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy-saving algorithm for pumping systems based on fuzzy decision making., , , , , , and . SMC, page 2395-2400. IEEE, (2012)Learning from Explicit and Implicit Supervision Jointly For Algebra Word Problems., , , and . EMNLP, page 297-306. The Association for Computational Linguistics, (2016)Non-invasive Fiber Tracking on Diffusion Tensor MRI Using High-Temperature Superconducting Tape RF coil, , , , , , , and . Engineering in Medicine and Biology Society, 2005. IEEE-EMBS 2005. 27th Annual International Conference of the, page 2329--2332. (01-04 Sept. 2005)Using association rules and particle swarm optimization approach for part change., , , and . Expert Syst. Appl., 36 (4): 8178-8184 (2009)Preliminary Research on the Design of the Evaluation Ruler for the Judge of the Higher Education CIE (Creativity, Innovation and Entrepreneurship) Competition.. HCI (14), volume 14024 of Lecture Notes in Computer Science, page 201-214. Springer, (2023)Strengthening data privacy during propagation., and . SPME@MobiCom, page 37-42. ACM, (2014)BioPortal: a case study in infectious disease informatics., , , , , , and . JCDL, page 418. ACM, (2005)Optimal Filter Assignment Policy against Transit-Link Distributed Denial-of-Service Attack., , , and . GLOBECOM, page 1-6. IEEE, (2019)Stabilization of large-scale fuzzy systems with time-varying interconnection., , and . SMC, page 2027-2032. IEEE, (2011)User-Controlled Security Mechanism in Data-Centric Clouds., , , and . HPCC/CSS/ICESS, page 647-653. IEEE, (2015)