Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Periodic Action Temporal Localization Method Based on Two-Path Architecture for Product Counting in Sewing Video., , , , and . ICIC (3), volume 11645 of Lecture Notes in Computer Science, page 568-580. Springer, (2019)PON: Proposal Optimization Network for Temporal Action Proposal Generation., , and . ICIC (3), volume 12465 of Lecture Notes in Computer Science, page 145-157. Springer, (2020)Complexity Reduction for Direction of Arrival Estimation with Massive MIMO., , , , and . VTC Fall, page 1-5. IEEE, (2016)A Topic Approach to Sentence Ordering for Multi-document Summarization., , , , , and . Trustcom/BigDataSE/ISPA, page 1390-1395. IEEE, (2016)Randomised sequential and parallel algorithms for efficient quorum planted motif search., , and . IJDMB, 18 (2): 105-124 (2017)An Experimental Study of Jamming Attacks in Underwater Acoustic Communication., , , and . WUWNet, page 21:1-21:5. ACM, (2015)Query Answering for Existential Rules via Efficient Datalog Rewriting., , , , and . IJCAI, page 1933-1939. ijcai.org, (2020)Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic..A Novel Trust Model Based on Bayesian Network for Service-Oriented Grid., , , and . ACIS-ICIS, page 494-499. IEEE Computer Society, (2009)How Domain Knowledge Accumulation Influences Software Defects: An Empirical Analysis., , , and . QRS Companion, page 24-30. IEEE, (2017)An Efficient DDoS Detection with Bloom Filter in SDN., , , , and . Trustcom/BigDataSE/ISPA, page 1-6. IEEE, (2016)