Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Highly Efficient Infinity-Shaped Large Angular- and Polarization-Independent Metamaterial Absorber., , , , , and . Symmetry, 15 (2): 352 (February 2023)Detection and Correction Scheme of Internet Chat Lingo Based on Statistic and Pinyin Similarity., and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 169-174. Springer, (2012)A novel hybrid color registration algorithm for image stitching., and . IEEE Trans. Consumer Electronics, 52 (3): 1129-1134 (2006)Mining Micro-blogs: Opportunities and Challenges., , , , , , , and . Computational Social Networks, Springer, (2012)Kinematic Characteristics Analysis of a Double-Ring Truss Deployable Antenna Mechanism., , , , and . ICIRA (4), volume 11743 of Lecture Notes in Computer Science, page 247-259. Springer, (2019)All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors., , , , and . INFOCOM, page 1602-1610. IEEE, (2009)A Vulnerability Attack Graph Generation Method Based on Scripts., , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 45-50. Springer, (2012)Text-Based Twitter User Geolocation Prediction., , and . J. Artif. Intell. Res., (2014)SUM: Suboptimal Unitary Multi-task Learning Framework for Spatiotemporal Data Prediction., , , and . CoRR, (2019)Human Assisted Positioning Using Textual Signs., , and . HotMobile, page 87-92. ACM, (2015)