Author of the publication

A WebGIS application: Tuna fishing ground forecasting information service system for the open South China Sea.

, , , and . IGARSS, page 3628-3631. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BDI Goal Recognition for Agent Program Learning., , and . INCoS, page 380-387. IEEE, (2013)Iterated Local Search for single-machine scheduling with sequence-dependent setup times to minimize total weighted tardiness., , and . J. Scheduling, 17 (3): 271-287 (2014)An Authentication Data Structure of Provable Data Possession with Dynamic Data Operation in Cloud Computing., , and . SpaCCS Workshops, volume 10067 of Lecture Notes in Computer Science, page 371-381. (2016)Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization., , and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 153-168. Springer, (2017)Evolutionary Game-Based Trust Strategy Adjustment among Nodes in Wireless Sensor Networks., , , , and . IJDSN, (2015)A WebGIS application: Tuna fishing ground forecasting information service system for the open South China Sea., , , and . IGARSS, page 3628-3631. IEEE, (2016)Location-Semantic Aware Privacy Protection Algorithms for Location-Based Services., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1219-1224. IEEE, (2018)Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks., , , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 35-45. Springer, (2015)Signaling game based strategy of intrusion detection in wireless sensor networks., , , and . Computers & Mathematics with Applications, 62 (6): 2404-2416 (2011)Automatic BDI Plan Recognition from Process Execution Logs and Effect Logs., , , , , and . EMAS@AAMAS, volume 8245 of Lecture Notes in Computer Science, page 274-291. Springer, (2013)