Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outlier Robust ICP for Minimizing Fractional RMSD, , and . CoRR, (2006)Real-time scheduling home caregivers based on disruption management., , and . IEEM, page 1786-1790. IEEE, (2015)Analytical models for threshold voltage, drain induced barrier lowering effect of junctionless triple-gate FinFETs., , , , , and . ASICON, page 1-4. IEEE, (2015)Reconstructing positive surveys from negative surveys by improved artificial immune network., , and . SSCI, page 1116-1121. IEEE, (2018)A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases., , and . CICS, page 31-38. IEEE, (2011)Enhanced VIP Algorithms for Forwarding, Caching, and Congestion Control in Named Data Networks., , , and . GLOBECOM, page 1-7. IEEE, (2016)Beyond Log Files: Using Multi-Modal Data Streams Towards Data-Driven KC Model Improvement., , and . EDM, page 436-441. International Educational Data Mining Society (IEDMS), (2016)Study on Virtual Camera with Preset Shot Types Based on Composition Aesthetic Computing., and . Trans. Edutainment, (2017)A memetic algorithm for optimization of combination chemotherapy with dose adjustment., , and . CASE, page 207-212. IEEE, (2017)A Two-Factor Authentication Scheme based on Negative Databases., , and . SSCI, page 1110-1115. IEEE, (2018)