Author of the publication

Network Security Situation Element Extraction Based on Projection Pursuit Regression.

, , and . IMIS, page 405-408. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Land-use change analysis in Shenmu county in the leoss plateau of China using remote sensing and GIS., and . IGARSS, page 2295-2298. IEEE, (2005)Building Requirements Semantics for Networked Software Interoperability., , and . JSEA, 3 (2): 125-133 (2010)Optimal grid holey packings with block size 3 and 4., , and . Des. Codes Cryptogr., 52 (1): 107-124 (2009)Extensions to BGP-Signaled Pseudowires to Support Flow-Aware Transport Labels., , , , and . RFC, (June 2018)Eddy Current Sensor System for Blade Tip Clearance Measurement Based on a Speed Adjustment Model., , , , , , and . Sensors, 19 (4): 761 (2019)Active and Adaptive Services Resource Provisioning with Personalized Customization., , and . IEEE WISA, page 101-106. IEEE Computer Society, (2013)Distributed and Collaborative Requirements Elicitation Based on Social Intelligence., , and . WISA, page 127-130. IEEE Computer Society, (2012)Project Scheduling Problem for Software Development with Random Fuzzy Activity Duration Times., , , and . ISNN (2), volume 5552 of Lecture Notes in Computer Science, page 60-69. Springer, (2009)Research on Micro-blog New Word Recognition Based on MapReduce., , , , and . BIC-TA (2), volume 682 of Communications in Computer and Information Science, page 379-387. Springer, (2016)All-Optically Controlled Quantum Memory for Light with a Cavity-Optomechanical System., , and . Entropy, 15 (2): 434-444 (2013)