Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Activity Auto-Completion: Predicting Human Activities from Partial Videos., , and . ICCV, page 3191-3199. IEEE Computer Society, (2015)Cross-network and cross-layer optimized video streaming over LTE and WCDMA downlink., , , , , , and . ISCC, page 868-873. IEEE Computer Society, (2016)A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks., , , , and . Sensors, 16 (10): 1630 (2016)Enhancing generative conversational service agents with dialog history and external knowledge., , , , , and . Computer Speech & Language, (2019)Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity., and . ACM Trans. Internet Techn., 18 (3): 34:1-34:23 (2018)A localization algorithm of adaptively determining the ROI of the reference circle in image., , , , and . MIPPR, volume 10611 of SPIE Proceedings, page 1061110. SPIE, (2017)A Large Scale Analysis of DNS Water Torture Attack., , , , , and . CSAI/ICIMT, page 168-173. ACM, (2018)Group Linguistic Bias Aware Neural Response Generation., , , , , and . SIGHAN@IJCNLP, page 1-10. Association for Computational Linguistics, (2017)Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains., , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 248-262. Springer, (2008)FT-Offload: A Scalable Fault-Tolerance Programing Model on MIC Cluster., , , and . ICA3PP (4), volume 9531 of Lecture Notes in Computer Science, page 3-17. Springer, (2015)