Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Highly Efficient Infinity-Shaped Large Angular- and Polarization-Independent Metamaterial Absorber., , , , , and . Symmetry, 15 (2): 352 (February 2023)Data Mining Support for the Improvement of MODIS Aerosol Retrievals., , , and . IGARSS, page 2453-2456. IEEE, (2006)Detection and Correction Scheme of Internet Chat Lingo Based on Statistic and Pinyin Similarity., and . ICICA (1), volume 307 of Communications in Computer and Information Science, page 169-174. Springer, (2012)Text-Based Twitter User Geolocation Prediction., , and . J. Artif. Intell. Res., (2014)A Vulnerability Attack Graph Generation Method Based on Scripts., , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 45-50. Springer, (2012)SUM: Suboptimal Unitary Multi-task Learning Framework for Spatiotemporal Data Prediction., , , and . CoRR, (2019)Mining Micro-blogs: Opportunities and Challenges., , , , , , , and . Computational Social Networks, Springer, (2012)All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors., , , , and . INFOCOM, page 1602-1610. IEEE, (2009)Kinematic Characteristics Analysis of a Double-Ring Truss Deployable Antenna Mechanism., , , , and . ICIRA (4), volume 11743 of Lecture Notes in Computer Science, page 247-259. Springer, (2019)Performance Improvement using Dynamic Contention Window Adjustment for Initial Ranging in IEEE 802.16 P2MP Networks., , , and . WCNC, page 1877-1882. IEEE, (2007)