Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on text representation method based on deep learning and topic information., , and . Computing, 102 (3): 623-642 (2020)Supporting QoS-Based Discovery for Visualization Web Services., , and . IJDSN, 5 (1): 19 (2009)Gossip-Based Load Balance Strategy in Big Data Systems with Hierarchical Processors., , and . Wireless Personal Communications, 98 (1): 157-172 (2018)PyVF: A python program for extracting vertical features from LiDAR-DEMs., , and . Environ. Model. Softw., (2022)Workflow-Based Distributed Visualization., and . GCC, page 713-720. IEEE Computer Society, (2007)Anthropogenic, Direct Pressures on Coastal Wetlands, , , , , , , , , and 13 other author(s). Frontiers in Ecology and Evolution, (July 2020)A CTR Prediction Approach for Advertising Based on Embedding Model and Deep Learning., , , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 744-750. IEEE, (2018)Applying Aspect-Orientation in Designing Security Systems: A Case Study., , , , , and . SEKE, page 360-365. (2004)Bringing semantics to visualization services., , and . Adv. Eng. Softw., 39 (6): 514-520 (2008)THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection., , , , and . J. Supercomput., 76 (9): 7489-7518 (2020)