Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks., , , and . Ad Hoc Networks, 11 (8): 2500-2511 (2013)Towards energy-efficient storage placement in large scale sensor networks., , , and . Frontiers of Computer Science, 8 (3): 409-425 (2014)Topic modeling in multimedia: algorithms and applications., , and . Soft Comput., 19 (1): 1-2 (2015)DICH: A framework for discovering implicit communities hidden in tweets., , and . World Wide Web, 18 (4): 795-818 (2015)Check out the Rules: Towards Time-Efficient Rule Checking over RFID Tags., , , and . MONET, 19 (4): 524-533 (2014)Dynamic Assortment Customization with Limited Inventories., , and . Manufacturing & Service Operations Management, 17 (4): 538-553 (2015)The Role of Component Commonality in Product Assortment Decisions., , and . Manufacturing & Service Operations Management, 13 (2): 261-270 (2011)Data driven model mismatch detection based on statistical band of Markov parameters., , , , and . Computers & Electrical Engineering, 40 (7): 2178-2192 (2014)Type-2 fuzzy Gaussian mixture models., , and . Pattern Recognition, 41 (12): 3636-3643 (2008)Ergodic capacity region for the uplink OFDMA network., , and . WCSP, page 1-6. IEEE, (2012)