Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

K-Means on Commodity GPUs with CUDA., , , , and . CSIE (3), page 651-655. IEEE Computer Society, (2009)Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , and . IAS, page 3-8. IEEE Computer Society, (2007)A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , and . SEC, volume 214 of IFIP Conference Proceedings, page 239-250. Kluwer, (2002)Label propagation based evolutionary clustering for detecting overlapping and non-overlapping communities in dynamic networks., , , , , and . Knowl.-Based Syst., (2015)Utility function of TCP Reno under precise end-to-end drop probability., , and . SCIENCE CHINA Information Sciences, 56 (1): 1-6 (2013)A formal semantics for debugging synchronous message passing-based concurrent programs., , and . SCIENCE CHINA Information Sciences, 57 (12): 1-18 (2014)Energy efficient sequential sensing in multi-user cognitive ad hoc networks: A consideration of an ADC device., , and . Journal of Communications and Networks, 14 (2): 188-194 (2012)Capturing the severity of type II errors in high-dimensional multiple testing., , and . J. Multivariate Analysis, (2015)A biting-down approach to hierarchical decomposition of object-oriented systems based on structure analysis., , , , and . Journal of Software Maintenance, 22 (8): 567-596 (2010)A Directional-Edge-Based Real-Time Object Tracking System Employing Multiple Candidate-Location Generation., , , and . IEEE Trans. Circuits Syst. Video Techn., 23 (3): 503-517 (2013)