Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprint matching based on ridge similarity., and . ICASSP, page 1701-1704. IEEE, (2008)Non-Alignment Fingerprint Matching Based on Local and Global Information., , , and . ICICIC (3), page 369-373. IEEE Computer Society, (2006)Inferring social influence and meme interaction with Hawkes processes., , and . ISI, page 135-137. IEEE, (2015)25 Years of Collaborations in IEEE Intelligent Systems., , , , and . IEEE Intelligent Systems, 25 (6): 67-75 (2010)Meme extraction and tracing in crisis events., , , , , and . ISI, page 61-66. IEEE, (2016)Session details: How good can it be?. EWSN, ACM, (2019)Poster: Online Learning for Reliable Packet-level Cross-Technology Communication., , , , , , and . EWSN, page 230-231. ACM, (2019)Analyzing Spatio-temporal Patterns of Online Public Attentions in Emergency Events: A Case Study of 2009 H1N1 Influenza Outbreak in China., , , and . ICSH, volume 8549 of Lecture Notes in Computer Science, page 44-50. Springer, (2014)Portrayal of Electronic Cigarettes on YouTube., , , , , , and . ICSH, volume 8040 of Lecture Notes in Computer Science, page 1-6. Springer, (2013)ZIGFI: Harnessing Channel State Information for Cross-Technology Communication., , , , and . INFOCOM, page 360-368. IEEE, (2018)