Author of the publication

The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithms.

, , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 119-126. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Home Model based on Ontology and Context-awareness., and . GrC, page 830-833. IEEE, (2008)Adaptive firefly algorithm with alternative search., , , , , , and . CEC, page 1779-1785. IEEE, (2016)Game Theoretic Request Scheduling with Queue Priority in Video Sensor Networks., , , and . IJDSN, (2014)A Broadcast-Enabled Sensing System for Embedded Multi-core Processors., , , and . ISVLSI, page 190-195. IEEE Computer Society, (2014)Energy Stable Numerical Schemes for a Hydrodynamic Model of Nematic Liquid Crystals., , , and . SIAM J. Scientific Computing, (2016)Numerical approximations for the molecular beam epitaxial growth model based on the invariant energy quadratization method., , and . J. Comput. Physics, (2017)Energy-stable Runge-Kutta schemes for gradient flow models using the energy quadratization approach., and . Appl. Math. Lett., (2019)Spatial Stream Backscatter Using Commodity WiFi., , and . MobiSys, page 191-203. ACM, (2018)The Construction of an Individual Credit Risk Assessment Method: Based on the Combination Algorithms., , and . ICICA (LNCS), volume 6377 of Lecture Notes in Computer Science, page 119-126. Springer, (2010)An Improved Particle Swarm Optimization for Complex Optimization Problems., , and . IScIDE, volume 8261 of Lecture Notes in Computer Science, page 868-874. Springer, (2013)