Author of the publication

2DCMA: An Effective Maintenance Algorithm of Materialized Views in Peer Data Management Systems.

, , and . J. Comput. Sci. Technol., 21 (4): 503-512 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On generalized parameterized inexact Uzawa method for a block two-by-two linear system., , and . J. Computational Applied Mathematics, (2014)A Highly Efficient Implementation of I/O Functions on GPU., , , and . IPDPS Workshops, page 2378-2383. IEEE Computer Society, (2012)ChemDIS 2: an update of chemical-disease inference system., and . Database, (2018)Multi-agent Pursuit-Evasion Algorithm Based on Contract Net Interaction Protocol., , and . ICNC (3), volume 3612 of Lecture Notes in Computer Science, page 482-489. Springer, (2005)SkinSensDB: a curated database for skin sensitization assays., , , , , and . J. Cheminformatics, 9 (1): 5:1-5:6 (2017)Prediction of the RFID Identification Rate Based on the Neighborhood Rough Set and Random Forest for Robot Application Scenarios., , , , , , and . Complex., (2020)A generalization of parameterized inexact Uzawa method for singular saddle point problems., and . Applied Mathematics and Computation, 219 (9): 4225-4231 (2013)Blind rate detection for CDMA2000 1x EV-DO reverse traffic channel., , and . ROBIO, page 2244-2248. IEEE, (2009)Preconditioned AHSS iteration method for singular saddle point problems., and . Numerical Algorithms, 63 (3): 521-535 (2013)RFID-Based Guide Gives Museum Visitors More Freedom., , and . IT Professional, 13 (2): 25-29 (2011)