Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy Monitoring and a Finite State Automata Model., , , , and . CSSE (2), page 646-649. IEEE Computer Society, (2008)978-0-7695-3336-0.Adversarial Sub-sequence for Text Generation., , , , , , and . CoRR, (2019)Quantum computing cryptography: Unveiling cryptographic Boolean functions with quantum annealing., , , , , , and . CoRR, (2018)An Efficient Elliptic Curve Discrete Logarithm based Trapdoor Hash Scheme without Key Exposure., , and . JCP, 8 (11): 2851-2856 (2013)An Improved Framework of Disaster-Tolerance Oriented Adaptive Failure Detection., , , and . ISCID (1), page 228-231. IEEE Computer Society, (2011)Bag-of-Embeddings for Text Classification., , , and . IJCAI, page 2824-2830. IJCAI/AAAI Press, (2016)Time Synchronization Algorithm for Wireless Sensor Networks Based on Frequency Offset Estimation., , , and . Int. J. Online Eng., 14 (6): 71-84 (2018)Network System Model-Based Multi-level Policy Generation and Representation., , , , and . CSSE (2), page 283-287. IEEE Computer Society, (2008)978-0-7695-3336-0.The Construction of a Kind of Chat Corpus in Chinese Word Segmentation., , and . WI-IAT (3), page 168-172. IEEE Computer Society, (2015)978-1-4673-9618-9.A high-performance workflow system for subsurface simulation., , , , , , , , , and 8 other author(s). Environmental Modelling and Software, (2014)