Search for persons
X
?
?
Proceedings of the 2005 ACM symposium on Applied computing ,
3
An approximation algorithm for haplotype inference by maxim..:
, In:
?
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms ,
4
A polynomial time approximation scheme for minimum routing ..:
, In:
?
2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT) ,
5
Substation One-Line Diagram Automatic Generation Based On I..:
, In:
?
2022 Global Conference on Robotics, Artificial Intelligence and Information Technology (GCRAIT) ,
6
Research on Chinese Word Segmentation Algorithm based on Di..:
, In:
?
2015 USNC-URSI Radio Science Meeting (Joint with AP-S Symposium) ,
7
An efficient numerical method to analyze nanoplasmonic stru..:
, In:
?
The Second European Conference on Antennas and Propagation, EuCAP 2007 ,
8
Recent Trends in Computational Electromagnetics:
, In:
?
Lecture Notes in Electrical Engineering; Signal and Information Processing, Networking and Computers ,
9
Comprehensive Analysis Scheme of Video Service Based on XDR:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
10
Research on Enterprises Growth for Industries in Post-Epide..:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
11
5G/5G-A Private Network: Construction, Operation and Applic..:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
12
Research on Operation Evolution of 5G Non-Public Network:
, In:
?
Lecture Notes in Electrical Engineering; Signal and Information Processing, Networking and Computers ,
13
Cellular Network Coverage Hole Detection and Diagnosis Meth..:
, In:
?
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
14
A Novel User Mobility Prediction Scheme based on the Weight..:
, In:
?
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
15