Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router., , and . TIIS, 4 (3): 428-451 (2010)Analysis of user's behavior and resource characteristics for private trackers., , , and . Peer-to-Peer Networking and Applications, 8 (3): 432-446 (2015)Dynamic author name disambiguation for growing digital libraries., , , , and . Inf. Retr. Journal, 18 (5): 379-412 (2015)Tree-aware selective frame discard for P2P IPTV system on set-top boxes., , and . IEEE Trans. Consumer Electronics, 55 (4): 1982-1987 (2009)Motif-Based Hyponym Relation Extraction from Wikipedia Hyperlinks., , , , , and . IEEE Trans. Knowl. Data Eng., 26 (10): 2507-2519 (2014)Exploring community structure of software Call Graph and its applications in class cohesion measurement., , , , , , and . Journal of Systems and Software, (2015)Software structure evaluation based on the interaction and encapsulation of methods., , , , , and . SCIENCE CHINA Information Sciences, 55 (12): 2816-2825 (2012)An efficient online active learning algorithm for binary classification., , and . Pattern Recognition Letters, (2015)Performance Analysis of Grid Architecture via Queueing Theory., , and . Int. J. Found. Comput. Sci., 25 (6): 697-722 (2014)Schaltkreissimulation auf Workstation Clustern., and . Praxis der Informationsverarbeitung und Kommunikation, 18 (3): 154-157 (1995)