Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Geodesic Centroidal Voronoi Tessellations: Theories, Algorithms and Applications., , , , and . CoRR, (2019)The Duality of Geodesic Voronoi/Delaunay Diagrams For An Intrinsic Discrete Laplace-Beltrami Operator on Simplicial Surfaces., , , and . CCCG, Carleton University, Ottawa, Canada, (2014)Integration of Networking, Caching, and Computing in Wireless Systems: A Survey, Some Research Issues, and Challenges., , , , and . IEEE Commun. Surv. Tutorials, 20 (1): 7-38 (2018)Securing Cognitive Radio Vehicular Ad Hoc Networks with Fog Computing., , , , , and . Ad Hoc Sens. Wirel. Networks, 40 (1-2): 73-95 (2018)A Study on Acceptance of Educational Games for the Students in the Stage of Compulsory Education., , , , and . ICBL, volume 11546 of Lecture Notes in Computer Science, page 316-326. Springer, (2019)Learning Kullback-Leibler Divergence-Based Gaussian Model for Multivariate Time Series Classification., , , , , and . IEEE Access, (2019)Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS)., , , and . EMBC, page 3454-3457. IEEE, (2019)Contribution of Chinese publications in computer science: A case study on LNCS., and . Scientometrics, 75 (3): 519-534 (2008)Parallel Chen-Han (PCH) Algorithm for Discrete Geodesics, , and . CoRR, (2013)Entity Linking: An Issue to Extract Corresponding Entity With Knowledge Base., , and . IEEE Access, (2018)