Author of the publication

Technological Capability Enhancement Mechanism of Software Outsourcing Enterprises.

, , , and . Web Intelligence/IAT Workshops, page 82-85. IEEE Computer Society, (2011)978-0-7695-4513-4.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new statistical setup and hold time definition., , and . ICICDT, page 1-4. IEEE, (2012)Prosodic Boundary Prediction Based on Maximum Entropy Model with Error-Driven Modification., , and . ISCSLP, volume 4274 of Lecture Notes in Computer Science, page 149-160. Springer, (2006)Generative Graph Augmentation for Minority Class in Fraud Detection., , , , and . CIKM, page 4200-4204. ACM, (2023)Stepped Warm-Up-The Progressive Interaction Approach for Human-Robot Interaction in Public., , , , , , , and . HCI (19), volume 11584 of Lecture Notes in Computer Science, page 309-327. Springer, (2019)Data-Driven Subsynchronous Oscillation Suppression for Renewable Energy Integrated Power Systems Based on Koopman Operator., , , , and . CoRR, (2024)Pre-Training on Large-Scale Generated Docking Conformations with HelixDock to Unlock the Potential of Protein-ligand Structure Prediction Models., , , , , , , , , and 3 other author(s). CoRR, (2023)HelixADMET: a robust and endpoint extensible ADMET system incorporating self-supervised knowledge transfer., , , , , , , , , and 1 other author(s). Bioinform., 38 (13): 3444-3453 (2022)On the Achievable Rate of MIMO Cognitive Radio Network with Multiple Secondary Users., , , and . VTC Spring, page 1-5. IEEE, (2014)HelixFold-Multimer: Elevating Protein Complex Structure Prediction to New Heights., , , , , , and . CoRR, (2024)IS-WARS: Intelligent and Stealthy Adversarial Attack to Wi-Fi-Based Human Activity Recognition Systems., , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3899-3912 (2022)