Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Color Image Segmentation Method Based on Improved Region Growing., , , and . AICI, volume 7530 of Lecture Notes in Computer Science, page 365-373. Springer, (2012)Research on the Key Technology of M2M Gateway., , and . HCC, volume 8944 of Lecture Notes in Computer Science, page 837-843. Springer, (2014)An Effective Approximation Scheme for Multiconstrained Quality-of-Service Routing., , and . GLOBECOM, page 1-6. IEEE, (2010)Meta-analysis of Proportions of Rare Events-A Comparison of Exact Likelihood Methods with Robust Variance Estimation., , and . Communications in Statistics - Simulation and Computation, 45 (8): 3036-3052 (2016)Advanced Persistent Threat Detection Method Research Based on Relevant Algorithms to Artificial Immune System., , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 221-228. Springer, (2014)Empirical Study on Knowledge Management's Effect on Organizational Effectiveness., and . ICICA (2), volume 106 of Communications in Computer and Information Science, page 80-87. Springer, (2010)A Scientific Workflow System Based on GOS., , and . HPCA (China), volume 5938 of Lecture Notes in Computer Science, page 236-241. Springer, (2009)QoS-aware service selection in virtualization-based Cloud computing., , , , , and . APNOMS, page 1-8. IEEE, (2012)A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning., , , and . J. Electr. Comput. Eng., (2017)A Sort of Knowledge Metadata Management Model in Semantic Grid Environment., , and . J. Softw., 7 (1): 125-132 (2012)