Author of the publication

DTMBIO 2011: international workshop on data and textmining in biomedical informatics.

, , , and . CIKM, page 2617-2618. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross Deployment Networking and Systematic Performance Analysis of Underwater Wireless Sensor Networks., , , , , and . Sensors, 17 (7): 1619 (2017)Intrusion detection of sinkhole attacks in large-scale wireless sensor networks., , and . WCNIS, page 711-716. IEEE, (2010)Securing Real-Time Opportunistic Spectrum Access in Cognitive Networks against Malicious Secondary Users., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2015)An Approximately Optimal Rendezvous Scheme for Dynamic Spectrum Access Networks., , , and . GLOBECOM, page 1-5. IEEE, (2011)A robust malicious user detection scheme in cooperative spectrum sensing., , , and . GLOBECOM, page 4856-4861. IEEE, (2012)Depth Estimation From a Single Image Using Guided Deep Network., and . IEEE Access, (2019)Distortion Analysis of Component Composition and Web Service Composition., , and . APWeb Workshops, volume 3842 of Lecture Notes in Computer Science, page 877-884. Springer, (2006)Performance analysis of 802.11b networks in the presence of interference-aware Bluetooth devices., and . QSHINE, page 31. ACM, (2007)The impact of secondary user mobility and primary user activity on spectrum sensing in cognitive vehicular networks., , and . INFOCOM Workshops, page 588-593. IEEE, (2015)Opinion polarity detection in Twitter data combining shrinkage regression and topic modeling., , , and . J. Informetrics, 10 (2): 634-644 (2016)