Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contrast enhancement with chromaticity error bound., and . ICIP, page 4507-4511. IEEE, (2014)Dlfinder: characterizing and detecting duplicate logging code smells., , , and . ICSE, page 152-163. IEEE / ACM, (2019)Soft binary segmentation-based backlit image enhancement., , and . MMSP, page 1-5. IEEE, (2015)Joint Multi-Sensor Calibration and Multi-Target Tracking Based on Hierarchical Point Processes., , , , , and . CISP-BMEI, page 1-8. IEEE, (2018)Word Segmentation for Chinese Judicial Documents., , , , , , , and . ICPCSEE (1), volume 1058 of Communications in Computer and Information Science, page 466-478. Springer, (2019)Video Restoration Against Yin-Yang Phasing., , and . ICCV, page 549-557. IEEE Computer Society, (2015)An efficient load balancing algorithm for virtual machine allocation based on ant colony optimization., , , and . IJDSN, (2018)Design and Implementation of CNN Custom Processor Based on RISC-V Architecture., , and . HPCC/SmartCity/DSS, page 1945-1950. IEEE, (2019)Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code., , , , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 148-156. Springer, (2009)Characterizing and detecting duplicate logging code smells.. ICSE (Companion Volume), page 147-149. IEEE / ACM, (2019)