Author of the publication

Selection of views to materialize using simulated annealing algorithms.

, , , and . Data Mining and Knowledge Discovery: Theory, Tools, and Technology, volume 4730 of SPIE Proceedings, page 29-33. SPIE, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fusing Skeletons and Texts Based on GCN-CNN for Action Recognition., , , , and . ICDIP, page 9:1-9:6. ACM, (2023)Joint Node Representation Learning and Clustering for Attributed Graph via Graph Diffusion Convolution., , , , and . IJCNN, page 1-7. IEEE, (2023)Improving Class Representation for Zero-Shot Action Recognition., and . MMAsia, page 79:1-79:7. ACM, (2023)Studies on a Hybrid Way of Rules and Statistics for Chinese Conjunction Usages Recognition., and . CLSW, volume 8229 of Lecture Notes in Computer Science, page 416-424. Springer, (2013)BERT with Enhanced Layer for Assistant Diagnosis Based on Chinese Obstetric EMRs., , , , , and . IALP, page 384-389. IEEE, (2019)Discriminative Key Pose Extraction Using Extended LC-KSVD for Action Recognition., , , , , and . DICTA, page 1-8. IEEE, (2014)Improving Random Test Sets Using a Locally Spreading Approach., , , , , and . QRS, page 32-41. IEEE, (2017)A hybrid algorithm for the minimum bounding sphere problem., , , and . Oper. Res. Lett., 50 (2): 150-154 (2022)An Analysis Method for Time-Based Features of Malicious Domains Based on Time Series Clustering., , , , and . WISA, volume 14094 of Lecture Notes in Computer Science, page 347-358. Springer, (2023)Research on parallel algorithm for sequential pattern mining., , , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730Q. SPIE, (2008)