Author of the publication

一种基于始末距离的时间序列符号聚合近似表示方法 (Symbolic Aggregate Approximation Method of Time Series Based on Beginning and End Distance).

, , and . 计算机科学, 45 (6): 216-221 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QBF-Based Symbolic Model Checking for Knowledge and Time., , and . TAMC, volume 4484 of Lecture Notes in Computer Science, page 386-397. Springer, (2007)Blockchain-Enabled Technique for Privacy- Preserved Medical Recommender System., , , , and . IEEE Access, (2023)Deep Reinforcement Learning for Video Summarization with Semantic Reward., , and . QRS Companion, page 754-755. IEEE, (2022)Testing access control policy through Change Rule and Swap Rule Algorithm (CRSR)., , and . J. Inf. Secur. Appl., (2016)Abstraction for Model Checking the Probabilistic Temporal Logic of Knowledge., , and . AICI (1), volume 6319 of Lecture Notes in Computer Science, page 209-221. Springer, (2010)Abstraction In Model Checking Real-Time Temporal Logic of Knowledge., and . J. Comput., 7 (2): 362-370 (2012)SAT-based Bounded Model Checking for SE-LTL., and . SNPD (3), page 582-587. IEEE Computer Society, (2007)A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks., , , and . IJDSN, (2013)A compositional symbolic verification framework for concurrent software.. Infoscale, volume 304 of ACM International Conference Proceeding Series, page 79. ACM, (2007)Symbolic algorithmic verification of intransitive generalized noninterference., , , , and . Sci. China Inf. Sci., 55 (7): 1650-1665 (2012)