Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering of Defect Reports Using Graph Partitioning Algorithms., , , and . SEKE, page 442-445. Knowledge Systems Institute Graduate School, (2009)(Vehicle's YB)-based LPB prediction model and anti-LPB (communication link)-reconstruction strategy in the (VLC/RF)-V2X network., , , , and . Comput. Networks, (December 2023)md5bloom: Forensic filesystem hashing revisited., , , and . Digit. Investig., 3 (Supplement): 82-90 (2006)Cooperative Optimization for OFDMA Resource Allocation in Multi-RRH Millimeter-Wave CRAN., , , and . IEEE Access, (2020)Identifying multiple influence sources in social networks based on latent space mapping., , , , and . Inf. Sci., (July 2023)A Random Walk Approach for Avoiding Unwanted Users in Competitive Social Network., , , , and . IEEE Access, (2020)Multiclass classification with potential function rules: Margin distribution and generalization., , and . Pattern Recognit., 45 (1): 540-551 (2012)Hybrid constrained simulated annealing and genetic algorithms for nonlinear constrained optimization., and . CEC, page 925-932. IEEE, (2001)Detection of local structures in images using local entropy information., and . ACM Southeast Conference, page 114-121. ACM, (2021)EAGLE: An Enhanced Attention-Based Strategy by Generating Answers from Learning Questions to a Remote Sensing Image., , , , , , , , , and . CICLing (2), volume 13452 of Lecture Notes in Computer Science, page 558-572. Springer, (2019)