From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Image fusion using multiscale edge-preserving decomposition based on weighted least squares filter., и . IET Image Processing, 8 (3): 183-190 (2014)P-M equation based multiscale decomposition and its application to image fusion., и . Pattern Anal. Appl., 17 (1): 167-178 (2014)An improved method for concept location during Program Comprehension., и . SNPD, стр. 106-111. IEEE Computer Society, (2004)An Adaptive Approach to Chinese Semantic Advertising., , , и . ICONIP (2), том 7063 из Lecture Notes in Computer Science, стр. 169-176. Springer, (2011)Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences., , , , и . IET Inf. Secur., 11 (1): 8-15 (2017)Boost Clickbait Detection Based on User Behavior Analysis., , , , и . APWeb/WAIM (2), том 10367 из Lecture Notes in Computer Science, стр. 73-80. Springer, (2017)A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing., и . Wirel. Commun. Mob. Comput., (2020)A probabilistic model for semantic advertising., , , , и . Knowl. Inf. Syst., 59 (2): 387-412 (2019)Maximum Multiflow in Wireless Network Coding., , , , и . IEICE Trans. Commun., 96-B (7): 1780-1790 (2013)The movement from monoliths to component-based network elements., , , , и . IEEE Commun. Mag., 39 (1): 86-93 (2001)