Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reduction about approximation spaces of covering generalized rough sets., and . Int. J. Approx. Reasoning, 51 (3): 335-345 (2010)Uncertainty Measurement for Covering Rough Sets., , , , and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 22 (2): 217-234 (2014)Contextual-code: Simplifying information pulling from targeted sources in physical world., , , , , and . INFOCOM, page 2245-2253. IEEE, (2015)Piecewise continuous observer design used for networked or visual servoing control systems., , , and . CCA, page 897-902. IEEE, (2012)Fast state estimation in linear time-varying systems: An algebraic approach., , and . CDC, page 2539-2544. IEEE, (2008)DLUT IR4QA System in NTCIR-8., , and . NTCIR, page 140-142. National Institute of Informatics (NII), (2010)Decision-theoretic Rough Sets-based Three-way Approximations of Interval-valued Fuzzy Sets., and . Fundam. Inform., 142 (1-4): 117-143 (2015)Dimensionality reduction of hypergraph information system., and . GrC, page 346-351. IEEE Computer Society, (2014)A double guarantee kidnapping detection in simultaneous localization and mapping., and . MFI, page 1-6. IEEE, (2014)TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords., , , , , , , and . ICC, page 7139-7144. IEEE, (2015)