Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Parallel Intrusion Detection System for High-Speed Networks., , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 439-451. Springer, (2004)Temporal Reasoning in Urban Growth Simulation., , , , and . RSKT, volume 5589 of Lecture Notes in Computer Science, page 529-537. Springer, (2009)Three-Way Decision Based Overlapping Community Detection., , , , and . RSKT, volume 8171 of Lecture Notes in Computer Science, page 279-290. Springer, (2013)Cost optimal planning with multi-valued landmarks., , and . AI Commun., 28 (3): 579-590 (2015)Bag of Tricks for Image Classification with Convolutional Neural Networks., , , , , and . CoRR, (2018)Influence Maximization Across Partially Aligned Heterogenous Social Networks., , , , and . PAKDD (1), volume 9077 of Lecture Notes in Computer Science, page 58-69. Springer, (2015)Unsupervised Deep Embedding for Clustering Analysis., , and . ICML, volume 48 of JMLR Workshop and Conference Proceedings, page 478-487. JMLR.org, (2016)On the Complexity and Algorithms of Coalition Structure Generation in Overlapping Coalition Formation Games., , , and . ICTAI, page 868-873. IEEE Computer Society, (2012)False-Name-Proof Mechanisms for Path Auctions in Social Networks., , , , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 1485-1492. IOS Press, (2016)The Anatomy of Web Services., , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 1063-1066. Springer, (2003)