Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Operation of Secure Cyber-Physical Systems., and . IEEE Embed. Syst. Lett., 7 (1): 3-6 (2015)Adaptive control of pre-fetching., and . Perform. Evaluation, 46 (2-3): 177-192 (2001)Cognitive Driven Multilayer Self-Paced Learning with Misclassified Samples., , and . Complex., (2019)Resolving the GPU responsiveness dilemma through program transformations., , , , , and . Frontiers Comput. Sci., 12 (3): 545-559 (2018)Expert Finding in Heterogeneous Bibliographic Networks with Locally-trained Embeddings., , , , and . CoRR, (2018)Semi-Supervised Multi-View Fusion for Identifying CAP and COVID-19 With Unlabeled CT Images., , , , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 7 (3): 887-899 (June 2023)Energy Efficiency Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks., and . J. Inf. Sci. Eng., 34 (2): 419-433 (2018)Monitoring Seasonal Movement Characteristics of the Landslide Based on Time-Series InSAR Technology: The Cheyiping Landslide Case Study, China., , , , , , and . Remote. Sens., 15 (1): 51 (January 2023)James St. Andre and Peng Hsiao-yen (eds). 2012. China and Its Others. Knowledge Transfer through Translation. Babel, (2012)The IT Challenges in Disaster Relief: What We Learned From Hurricane Harvey., and . IT Prof., 22 (6): 52-58 (2020)