Author of the publication

A Task Selecting Algorithm for Personal Schedules in Workflow Systems.

, , , , , , and . WISE Workshops, volume 8182 of Lecture Notes in Computer Science, page 133-143. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nighttime Single Image Dehazing via Pixel-Wise Alpha Blending., , , , , and . IEEE Access, (2019)IKE vulnerability discovery based on fuzzing., , , and . Security and Communication Networks, 6 (7): 889-901 (2013)Modeling and identification of the nociceptive system using psychophysical measurements.. University of Twente, Enschede, Netherlands, (2015)base-search.net (ftunivtweneemcs:oai:ewi.utwente.nl:26515).Improving Rocchio Algorithm for Updating User Profile in Recommender Systems., , , and . WISE (1), volume 8180 of Lecture Notes in Computer Science, page 162-174. Springer, (2013)Joint Optimization of Routing and Storage Node Deployment in Heterogeneous Wireless Sensor Networks Towards Reliable Data Storage., , , , and . WASA, volume 11604 of Lecture Notes in Computer Science, page 162-174. Springer, (2019)Unsupervised Extraction of Video Highlights Via Robust Recurrent Auto-encoders., , , , , and . CoRR, (2015)Study on the over-voltage and over-current of grid-connected inverters in non-fault conditions., , , and . ISIE, page 1080-1085. IEEE, (2012)Learning based screen image compression., , and . MMSP, page 77-82. IEEE, (2012)An efficient nonlocal variational method with application to underwater image restoration., , , , and . Neurocomputing, (2019)Attack Detection and Distributed Filtering for State-Saturated Systems Under Deception Attack., , , and . IEEE Trans. Control. Netw. Syst., 8 (4): 1918-1929 (2021)