From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intrusion detection model using gene expression programming to optimize parameters of convolutional neural network for energy internet., , , , , , и . Appl. Soft Comput., (февраля 2023)ECML: An Ensemble Cascade Metric Learning Mechanism towards Face Verification., , , , , и . CoRR, (2020)Resource Monitoring and Prediction in Cloud Computing Environments., , , и . ACIT-CSI, стр. 288-292. IEEE, (2015)Web Article Quality Assessment in Multi-dimensional Space., , , и . WAIM, том 6897 из Lecture Notes in Computer Science, стр. 214-225. Springer, (2011)Simulation research of ground target location algorithm based on photoelectric pod system., , , , и . RICAI, стр. 1084-1089. ACM, (2022)A Flexible Communication Mechanism for Pipeline Parallelism., , , и . ISPA/IUCC, стр. 778-785. IEEE, (2017)ECML: An Ensemble Cascade Metric-Learning Mechanism Toward Face Verification., , , , , и . IEEE Trans. Cybern., 52 (3): 1736-1749 (2022)Accelerating Wait-Free Algorithms: Pragmatic Solutions on Cache-Coherent Multicore Architectures., , , , и . IEEE Access, (2019)Person Re-Identification With Hierarchical Discriminative Spatial Aggregation., , , , , , и . IEEE Trans. Inf. Forensics Secur., (2022)A Multi-Attribute Pheromone Ant Secure Routing Algorithm Based on Reputation Value for Sensor Networks., , , , и . Sensors, 17 (3): 541 (2017)