Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A replication case study to measure the architectural quality of a commercial system., , , , , and . ESEM, page 31:1-31:8. ACM, (2014)Design rule spaces: a new form of architecture insight., , and . ICSE, page 967-977. ACM, (2014)Message visualizer: a visualization tool for chat messages., and . iConference, page 426-428. ACM, (2012)Users' Behavior Session: Integrate Passive Feedback into Microblog Recommendation., , , and . APWeb, volume 8709 of Lecture Notes in Computer Science, page 517-524. Springer, (2014)Hardware Design and Analysisof Block Cipher Components., and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 164-181. Springer, (2002)Hardware Performance Characterization of Block Cipher Structures., and . CT-RSA, volume 2612 of Lecture Notes in Computer Science, page 176-192. Springer, (2003)Misinformation in the Chinese Weibo., and . HCI (14), volume 12194 of Lecture Notes in Computer Science, page 407-418. Springer, (2020)Spatial-temporal characters of evapotranspiration in the Yellow River Delta., , , and . ICSDM, page 409-412. IEEE, (2011)A Case Study: Information and Communication Technologies Adoption in Higher Education in China and India., , and . AMCIS, page 44. Association for Information Systems, (2005)An innovation approach to H∞ fixed-lag smoothing for continuous time-varying systems., , , and . IEEE Trans. Automat. Contr., 49 (12): 2240-2244 (2004)