Xiaoxin Chen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2019
Hierarchical Reinforcement Learning for Multi-agent MOBA Game.
CoRR, 2019

Optimized Power Equipment Maintenance Strategy Based on Risk Assessment.
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019

Submission from vivo for Blizzard Challenge 2019.
Proceedings of the Blizzard Challenge 2019, Vienna, Austria, September 23, 2019, 2019

2017
An SDN controlled self-optimizing approach in circular array equipped small cells.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

2016
Energy Estimation of Partial Discharge Pulse Signals Based on Noise Parameters.
IEEE Access, 2016

Detecting anomaly based on time dependence for large scenes.
Proceedings of the IEEE International Conference on Information and Automation, 2016

2013
Using the Web to Train a Mobile Device Oriented Japanese Input Method Editor.
Proceedings of the Sixth International Joint Conference on Natural Language Processing, 2013

2012
Hybrid grey multiple attribute decision-making method with partial weight information.
Kybernetes, 2012

Decentralised indirect adaptive output feedback fuzzy <i>H</i> <sub>∞</sub> tracking design for a class of large-scale nonlinear systems.
Int. J. Syst. Sci., 2012

HGO-based decentralised indirect adaptive fuzzy control for a class of large-scale nonlinear systems.
Int. J. Syst. Sci., 2012

2011
H<sub>∞</sub> tracking-based decentralized hybrid adaptive output feedback fuzzy control for a class of large-scale nonlinear systems.
Fuzzy Sets Syst., 2011

2009
Stabilization of Discrete-Time Switched Systems with Input Time Delay and Its Applications in Networked Control Systems.
Circuits Syst. Signal Process., 2009

Identification Model of Logistic Regression Analysis on Listed Firms' Frauds in China.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

2008
Automated containment of rootkits attacks.
Comput. Secur., 2008

Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2004
Sufficient conditions for the existence positive periodic solutions of a class of neutral delay models with feedback control.
Appl. Math. Comput., 2004


  Loading...