Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information security control in the application of grid security., and . China HPC, page 198-202. ACM Press, (2007)Fault diagnosis system based on Dynamic Fault Tree Analysis of power transformer., , , , , , and . FSKD, page 2679-2682. IEEE, (2012)Cooperative maintenance decision system for power plant based on swarm intelligence., , , , and . ICNC, page 2903-2907. IEEE, (2010)UCSCXenaShiny: an R/CRAN package for interactive analysis of UCSC Xena data., , , , , , , , , and 4 other author(s). Bioinform., 38 (2): 527-529 (2022)Error Analysis of Mixed Residual Methods for Elliptic Equations., , , and . CoRR, (2023)On the Performance of Multi-Agent Detection in Mobile Delay-Sensitive Networks., , , and . GLOBECOM, page 1-6. IEEE, (2021)On equivalence relations generated by Cauchy sequences in countable metric spaces., and . Ann. Pure Appl. Log., 171 (10): 102854 (2020)NLOS Effect Mitigation via Spatial Geometry Exploitation in Cooperative Localization., , , , and . IEEE Trans. Wirel. Commun., 19 (9): 6037-6049 (2020)Vision-Based Localization in Multi-Agent Networks With Communication Constraints., , and . IEEE Trans. Veh. Technol., 71 (1): 518-532 (2022)Yield-Based Capability Index for Evaluating the Performance of Multivariate Manufacturing Process., , , and . Qual. Reliab. Eng. Int., 31 (3): 419-430 (2015)