Author of the publication

Application mobility in pervasive computing: A survey.

, , , and . Pervasive and Mobile Computing, 9 (1): 2-17 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3D Z-string: A new knowledge structure to represent spatio-temporal relations between objects in a video., , , and . Pattern Recognition Letters, 26 (16): 2500-2508 (2005)Improved HIS Model with Application to Edge Detection for Color Image., , , and . JCP, 7 (6): 1400-1404 (2012)Chinese QA and CLQA: NTCIR-5 QA Experiments at UNT., , , , , , and . NTCIR, National Institute of Informatics (NII), (2005)Necessary and sufficient fully separable criterion and entanglement of three-qubit Greenberger-Horne-Zeilinger diagonal states., , , and . Quantum Information Processing, 14 (7): 2463-2476 (2015)ABC: Accelerated Building of C/C++ Projects., , , , and . APSEC, page 182-189. IEEE Computer Society, (2015)The Current Status of Health Informatics Higher Education in China., , and . Health Informatics Journal, 9 (4): 211-223 (2003)Protecting Your Own Private Key in Cloud: Security, Scalability and Performance., , , , , , , , and . CNS, page 1-2. IEEE, (2018)Public-View and Object Petri Net Based Modeling of Cross-Organizational Process., , , , and . IEEE WISA, page 425-428. IEEE Computer Society, (2013)A Trust Evolution Model for P2P Networks., , , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 216-225. Springer, (2007)Multi-mode interaction middleware for software services., , , , and . Science in China Series F: Information Sciences, 51 (8): 985-999 (2008)