Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Trusted Boundary Based on Port Trust Value in Campus Area Network., , , and . CASoN, page 97-100. IEEE Computer Society, (2010)Quality Model of Maintenance Service for Cloud Computing., , and . HPCC/CSS/ICESS, page 1460-1465. IEEE, (2015)Hierarchical Bayes based Adaptive Sparsity in Gaussian Mixture Model., , , , and . Pattern Recognition Letters, (2014)Global existence and regularity of the weakly compressible Navier-Stokes system., and . Asymptotic Analysis, 76 (2): 61-86 (2012)Dynamic Route Diversion in Connectionless Mobile Ad Hoc Networks., , , and . NAS, page 53-61. IEEE Computer Society, (2008)Exploiting Pattern Relationship for Intrusion Detection., , and . SAINT, page 200-208. IEEE Computer Society, (2003)An energy-efficient PON based on digital filter multiple access technology., , , and . WOCC, page 1-4. IEEE, (2016)Global Classical Solutions to a Compressible Model for Micro-Macro Polymeric Fluids Near Equilibrium., , and . SIAM J. Math. Analysis, 50 (4): 4149-4179 (2018)Pedestrian Detection Using Gradient Local Binary Patterns., , and . IEICE Transactions, 95-A (8): 1280-1287 (2012)Human Detection Method Based on Non-Redundant Gradient Semantic Local Binary Patterns., , , , and . IEICE Transactions, 98-A (8): 1735-1742 (2015)