Author of the publication

A web service discovery computational method for IOT system.

, and . CCIS, page 1009-1012. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Influencing Factors of Online Consumers' Return Satisfaction., and . WHICEB, page 44. Association for Information Systems, (2016)High discriminative SIFT feature and feature pair selection to improve the bag of visual words model., , , , and . IET Image Processing, 11 (11): 994-1001 (2017)An Effective Approximation Scheme for Multiconstrained Quality-of-Service Routing., , and . GLOBECOM, page 1-6. IEEE, (2010)Advanced Persistent Threat Detection Method Research Based on Relevant Algorithms to Artificial Immune System., , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 221-228. Springer, (2014)Empirical Study on Knowledge Management's Effect on Organizational Effectiveness., and . ICICA (2), volume 106 of Communications in Computer and Information Science, page 80-87. Springer, (2010)QoS-aware service selection in virtualization-based Cloud computing., , , , , and . APNOMS, page 1-8. IEEE, (2012)A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning., , , and . J. Electr. Comput. Eng., (2017)Catheter-Based Polarization Sensitive Optical Coherence Tomography Using Similar Mueller Matrix Method., , , , , , , , and . IEEE Trans. Biomed. Eng., 67 (1): 60-68 (2020)Preliminary Through-Out Research on Parallel-Based Remote Sensing Image Processing., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 880-883. Springer, (2006)Research on Ideological and Political Education of College Students Based on Network Information Security., , , , and . ICIC (1), volume 12463 of Lecture Notes in Computer Science, page 458-467. Springer, (2020)