Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation Method of Online Learning Process Under the Background of Educational Big Data., and . eLEOT (2), volume 390 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 403-414. Springer, (2021)Data Mining Method of English Online Learning Behavior Based on Machine Learning Technology., and . eLEOT (1), volume 389 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 122-133. Springer, (2021)A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks., , and . PDCAT, page 233-238. IEEE, (2013)Reflection on Home Culture in English Course Materials Based on Data Analysis., , and . CSEE (4), volume 217 of Communications in Computer and Information Science, page 127-132. Springer, (2011)Mobility and Capacity Offload for 3G UMTS Femtocells., , , , , and . GLOBECOM, page 1-7. IEEE, (2009)Dynamics of processing invisible faces in the brain: Automatic neural encoding of facial expression information., , , , , and . NeuroImage, 44 (3): 1171-1177 (2009)The feet have it: Local biological motion cues trigger reflexive attentional orienting in the brain., , , and . NeuroImage, (2014)A topology-aware hierarchical structured overlay network based on locality sensitive hashing scheme., , , and . UPGRADE-CN, page 3-8. ACM, (2007)Query Execution in the Presence of Data Skew in Parallel Databases., , and . Australasian Database Conference, volume 18 of Australian Computer Science Communications, (1996)A High Performance Object-Oriented Destributed Parallel Database Architecture., and . HPCN Europe, volume 1401 of Lecture Notes in Computer Science, page 498-507. Springer, (1998)