Author of the publication

Multi-Document Summarization via the Minimum Dominating Set.

, and . COLING, page 984-992. Tsinghua University Press, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

M.Sc. Yunxuan Li University of Stuttgart

CV-Priv : Towards a Context Model for Privacy Policy Creation for Connected Vehicles, , and . 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), page 583-588. IEEE, (2023)
CV-Priv : Towards a Context Model for Privacy Policy Creation for Connected Vehicles, , and . 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), page 583-588. IEEE, (2023)Privacy in Connected Vehicles: Perspectives of Drivers and Car Manufacturers, , , , and . Service-Oriented Computing : 17th Symposium and Summer School, SummerSOC 2023, Heraklion, Crete, Greece, June 25 – July 1, 2023, Revised Selected Papers, 1847, page 59-68. Cham, Springer, (2023)
 

Other publications of authors with the same name

Aurora: A Cross-Layer Solution for Thermally Resilient Photonic Network-on-Chip., , , , , and . IEEE Trans. VLSI Syst., 23 (1): 170-183 (2015)Stability Criteria With Less LMI Variables for Neural Networks With Time-Varying Delay., , and . IEEE Trans. on Circuits and Systems, 55-II (11): 1188-1192 (2008)Neighbor Gradient-based Multicast Routing for Service-Oriented Applications., , , , , and . TIIS, 6 (9): 2231-2252 (2012)Distributed Consensus for Multiagent Systems with Communication Delays and Limited Data Rate., , and . SIAM J. Control and Optimization, 49 (6): 2239-2262 (2011)Hierarchical document classification using automatically generated hierarchy., , and . J. Intell. Inf. Syst., 29 (2): 211-230 (2007)Generalized energy-efficient algorithms for the RFID estimation problem., , , and . IEEE/ACM Trans. Netw., 20 (6): 1978-1990 (2012)Advanced modulation formats for short reach optical communication systems., , , , , and . IEEE Network, 27 (6): 6-13 (2013)Missing-Tag Detection and Energy-Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels., , , and . IEEE/ACM Trans. Netw., 22 (4): 1079-1091 (2014)The impact of social cloud reputation and structure on rational computation., , , , and . J. High Speed Networks, 21 (3): 181-194 (2015)An immunity based network security risk estimation.. Science in China Series F: Information Sciences, 48 (5): 557-578 (2005)