Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agent long-term coalition credit., , and . Expert Syst. Appl., 36 (5): 9457-9465 (2009)Bring QoS to P2P-based semantic service discovery for the Universal Network., , , , , and . Personal and Ubiquitous Computing, 13 (7): 471-477 (2009)PMC: Select Materialized Cells in Data Cubes., and . J. Comput. Sci. Technol., 21 (2): 297-305 (2006)DSD: Maintain Data Cubes More Efficiently., , and . Fundam. Inform., 59 (2-3): 173-190 (2004)Efficient distributed semantic based data and service unified discovery with one-dimensional semantic space., , , , and . J. Network and Computer Applications, (2015)An Online Adaptive Network Anomaly Detection Model., , , , and . CSO (2), page 365-368. IEEE Computer Society, (2009)978-0-7695-3605-7.Community-Based Relational Markov Networks in Complex Networks., , , and . RSKT, volume 6954 of Lecture Notes in Computer Science, page 301-310. Springer, (2011)A Contribution to Decision Tree Construction Based on Rough Set Theory., , and . Rough Sets and Current Trends in Computing, volume 3066 of Lecture Notes in Computer Science, page 637-642. Springer, (2004)A Selective Classifier for Incomplete Data., , , and . PAKDD, volume 5012 of Lecture Notes in Computer Science, page 870-876. Springer, (2008)Studying of granularity on group., , , and . GrC, page 125-127. IEEE, (2005)