Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalized Doubly Robust Learning Framework for Debiasing Post-Click Conversion Rate Prediction., , , , , , , and . KDD, page 252-262. ACM, (2022)Analysis of Human Factor in Air Traffic Control Unsafe Events Based on Improved DECIDE Model., , , and . HCI (5), volume 12185 of Lecture Notes in Computer Science, page 365-374. Springer, (2020)Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment., , , and . Wireless Personal Communications, 55 (1): 5-17 (2010)Incremental Evaluation of Visible Nearest Neighbor Queries., , and . IEEE Trans. Knowl. Data Eng., 22 (5): 665-681 (2010)Automated detection of epileptic EEGs using a novel fusion feature and extreme learning machine., , and . Neurocomputing, (2016)Relation Based Access Control. Studies on the Semantic Web IOS Press, (2010)An Ontology-Based Advisement Approach for SOA Design Patterns., , , , and . KMO, page 73-84. Springer, (2013)H∞ control for stochastic systems with Poisson jumps., and . J. Systems Science & Complexity, 24 (4): 683-700 (2011)Region based saliency detection by learning background information., , and . BMSB, page 1-6. IEEE, (2014)Recursive partitioning method for trajectory indexing., , , and . ADC, volume 104 of CRPIT, page 37-46. Australian Computer Society, (2010)