Author of the publication

An investigation of the smartphone user's in-game purchase intention.

, and . Int. J. Mob. Commun., 11 (6): 617-635 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Highly Efficient Infinity-Shaped Large Angular- and Polarization-Independent Metamaterial Absorber., , , , , and . Symmetry, 15 (2): 352 (February 2023)Detection and Correction Scheme of Internet Chat Lingo Based on Statistic and Pinyin Similarity., and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 169-174. Springer, (2012)SUM: Suboptimal Unitary Multi-task Learning Framework for Spatiotemporal Data Prediction., , , and . CoRR, (2019)Data Mining Support for the Improvement of MODIS Aerosol Retrievals., , , and . IGARSS, page 2453-2456. IEEE, (2006)MIMO over ESPAR with 16-QAM Modulation., , , , and . IEEE Wirel. Commun. Lett., 2 (6): 687-690 (2013)一种基于qemu的动态迁移模型 (Analytical Model for Qemu-based Live Migration Strategy)., , and . 计算机科学, 42 (Z6): 337-340 (2015)Delivering Content with Defined Priorities by Selective Agent and Relay Nodes in Content Centric Mobile Social Networks., , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 437-445. Springer, (2015)Human Assisted Positioning Using Textual Signs., , and . HotMobile, page 87-92. ACM, (2015)Tactical maneuver trajectory optimization for unmanned combat aerial vehicle using improved differential evolution., , , and . Soft Comput., 24 (8): 5959-5970 (2020)A Vulnerability Attack Graph Generation Method Based on Scripts., , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 45-50. Springer, (2012)