Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting the Theft of Natural Language Text Using Birthmark., , and . IIH-MSP, page 699-702. IEEE Computer Society, (2006)A New Method of Estimating Inputs., , and . ISDA (1), page 718-723. IEEE Computer Society, (2006)An anomaly detection approach for multiple monitoring data series based on latent correlation probabilistic model., , , , and . Appl. Intell., 44 (2): 340-361 (2016)Verification of workflow nets with transition conditions., , , and . Journal of Zhejiang University - Science C, 13 (7): 483-509 (2012)Adaptive music resizing with stretching, cropping and insertion - A generic content-aware music resizing framework., , , , and . Multimedia Syst., 19 (4): 359-380 (2013)Domain Invariant Transfer Kernel Learning., , , and . IEEE Trans. Knowl. Data Eng., 27 (6): 1519-1532 (2015)A new interpolation subdivision scheme for triangle/quad mesh., , , and . Graphical Models, 75 (5): 247-254 (2013)A New Fingerprint Sequences Matching Algorithm for Content-Based Copy Detection., , , and . IAS, page 427-430. IEEE Computer Society, (2009)Effective Predicate Abstraction for Program Verification., , , and . TASE, page 129-132. IEEE Computer Society, (2008)A Universal Significant Reference Model Set for Process Mining Evaluation Framework., , , , and . AP-BPM, volume 181 of Lecture Notes in Business Information Processing, page 16-30. Springer, (2014)