Author of the publication

Exploring simultaneous keyword and key sentence extraction: improve graph-based ranking using wikipedia.

, , , and . CIKM, page 2619-2622. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interval-Valued Linear Model., , and . Int. J. Comput. Intell. Syst., 8 (1): 114-127 (2015)Resilience of Structured Peer-to-Peer Systems., , and . Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks, CRC Press / Taylor & Francis, (2005)Improving reconstruction of tunnel lining defects from ground-penetrating radar profiles by multi-scale inversion and bi-parametric full-waveform inversion., , and . Adv. Eng. Informatics, (2019)Optimum policy in hybrid manufacturing/remanufacturing system., , and . Comput. Ind. Eng., 60 (3): 411-419 (2011)Autonomous control of running takeoff and landing for a fixed-wing unmanned aerial vehicle., , and . ICARCV, page 990-994. IEEE, (2012)Exploring Users' Intention to use QQ's Various Functions based on Social Cognitive Theory., , , and . WHICEB, page 30. Association for Information Systems, (2018)The bullwhip effect: Progress, trends and directions., and . Eur. J. Oper. Res., 250 (3): 691-701 (2016)General image denoising framework based on compressive sensing theory., , , and . Comput. Graph., (2014)Multi-cue based 3D residual network for action recognition., , , , , and . Neural Comput. Appl., 33 (10): 5167-5181 (2021)Heterogeneous data fusion and loss function design for tooth point cloud segmentation., , , , and . Neural Comput. Appl., 34 (20): 17371-17380 (2022)