Author of the publication

A Unifying Approach to Boundaries and Multidimensional Mereotopology.

, and . JOWO, volume 3637 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Cross-organization Privacy Protection Method Based on Federated Learning., , , and . IMMS, page 69-73. ACM, (2023)RAPTOR: Routing Attacks on Privacy in Tor., , , , , , and . CoRR, (2015)RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery., , , , and . ACSAC, page 827-840. ACM, (2022)A Game Model Analysis of the International Digital Service Tax in an Asymmetric Market Duopoly., , and . Int. J. Fuzzy Syst. Appl., (2024)AGRA: An Analysis-Generation-Ranking Framework for Automatic Abbreviation from Paper Titles., , , , , , , and . IJCAI, page 4221-4227. ijcai.org, (2017)Influence of Murder Incident of Ride-hailing Drivers on Ride-hailing User's Consuming Willingness in Nanchang., , , , , and . CoRR, (2020)Representation of Chinese criminal law in the semantic web., , , and . ICNC-FSKD, page 1676-1680. IEEE, (2016)Securing Internet Applications from Routing Attacks., , , , , , and . CoRR, (2020)Securing internet applications from routing attacks., , , , , , and . Commun. ACM, 64 (6): 86-96 (2021)Output Feedback Synthesis for a Two-Agent Nonlinear Microrobotic System., , and . CDC, page 6844-6850. IEEE, (2019)