Author of the publication

Entropy-Weighted Instance Matching Between Different Sourcing Points of Interest.

, , , and . Entropy, 18 (2): 45 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP., , , and . IPCCC, page 1-8. IEEE Computer Society, (2016)A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems., , , and . WASA (2), volume 12385 of Lecture Notes in Computer Science, page 105-112. Springer, (2020)A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules., , , , and . GreenCom, page 124-130. IEEE Computer Society, (2011)Physically Based Animation of Tongue on Fire in a Periodic Domain., , , and . ICAT Workshops, page 496-500. IEEE Computer Society, (2006)Research on Distributed Real Time Data Space SCADA Cluster for Large Power Grid., , , , , and . ICSAI, page 161-165. IEEE, (2018)A Trend Filtering Based Prediction Model on Network Traffic., and . ICNC-FSKD, volume 1075 of Advances in Intelligent Systems and Computing, page 874-882. Springer, (2019)Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning., , , , and . Wirel. Commun. Mob. Comput., (2021)An Intrusion Detection Scheme Based on Repeated Game in Smart Home., , , , , and . Mob. Inf. Syst., (2020)Test Case Minimization for Regression Testing of Composite Service Based on Modification Impact Analysis., , , , , , and . WISA, volume 12432 of Lecture Notes in Computer Science, page 15-26. Springer, (2020)Entropy-Weighted Instance Matching Between Different Sourcing Points of Interest., , , and . Entropy, 18 (2): 45 (2016)