Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatically constructing trusted cluster computing environment., , , , , , and . J. Supercomput., 55 (1): 51-68 (2011)Collaborative Language Grounding Toward Situated Human-Robot Dialogue., , , and . AI Magazine, 37 (4): 32-45 (2016)Probabilistic Modeling of IEEE 802.11 Distributed Coordination Functions., , , and . CoRR, (2014)Exploiting Group-Level Behavior Pattern for Session-Based Recommendation., , , , , , and . IEEE Trans. Knowl. Data Eng., 36 (1): 152-166 (January 2024)STAGE: Span Tagging and Greedy Inference Scheme for Aspect Sentiment Triplet Extraction., , , , , and . CoRR, (2022)Determination of ransomware payment based on Bayesian game models., , and . Comput. Secur., (2022)Risk comprehensive evaluation of urban network planning based on fuzzy Bayesian LS_SVM., , , , , and . Kybernetes, 39 (5): 707-722 (2010)Research on Innovative Application Mode of Human-Computer Interaction Design in Data Journalism., , and . HCI (4), volume 12765 of Lecture Notes in Computer Science, page 182-191. Springer, (2021)Quantum Approximate Optimization Algorithm for PD-NOMA User Pairing., , , , , and . ICC, page 2680-2685. IEEE, (2023)Improving Personality Consistency in Conversation by Persona Extending., , , , , and . CIKM, page 1350-1359. ACM, (2022)