Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public and expert collaborative evaluation model and algorithm for enterprise knowledge., , , , and . Enterprise IS, 7 (3): 375-393 (2013)Data-Driven Look-Ahead Unit Commitment Considering Forbidden Zones and Dynamic Ramping Rates., , , and . IEEE Trans. Ind. Informatics, 15 (6): 3267-3276 (2019)Hypertext versioning for embedded link models., , and . Hypertext, page 195-204. ACM, (2004)Textual and behavioral views of function changes., , and . TEFSE@ASE, page 8-13. ACM, (2005)Toward an understanding of bug fix patterns., , and . Empirical Software Engineering, 14 (3): 286-315 (2009)Integrated Stochastic Optimal Self-Scheduling for Two-Settlement Electricity Markets., and . INFORMS J. Comput., 34 (3): 1819-1840 (2022)Research on China's New Infrastructure Measurement Based on Perpetual Inventory Method., , , and . ICIIP, page 57:1-57:6. ACM, (2022)Exploring Cache Coding Scheme for Information-centric Networking., , , , , and . CSE, page 557-562. IEEE Computer Society, (2014)Memories of bug fixes., , and . SIGSOFT FSE, page 35-45. ACM, (2006)On the Quantification of Identity and Link Disclosures in Randomizing Social Networks., , , and . Advances in Information and Intelligent Systems, volume 251 of Studies in Computational Intelligence, Springer, (2009)