Author of the publication

Robust Principal Component Analysis with Non-Greedy l1-Norm Maximization.

, , , , and . IJCAI, page 1433-1438. IJCAI/AAAI, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel boundary determination algorithm for lane detection., , , , , , and . ICCVE, page 598-603. IEEE, (2013)Studying the effectiveness of an online argumentation model for improving undergraduate students' argumentation ability., , and . J. Comput. Assist. Learn., 36 (4): 526-539 (2020)A Web-based model for developing assessment literacy of secondary in-service teachers., , and . Comput. Educ., 57 (2): 1727-1740 (2011)Designing a Web-based assessment environment for improving pre-service teacher assessment literacy., , and . Comput. Educ., 51 (1): 448-462 (2008)Web-based Assessment and Test Analyses (WATA) system: development and evaluation., , , , and . J. Comput. Assist. Learn., 20 (1): 59-71 (2004)International Communication Association Annual Conference, San Francisco, CA, USA (May, 24-28, 2007)., and . Zeitschrift für Medienpsychologie, 19 (4): 167-168 (2007)Study on Heartbeat Information Acquired from Pressure Cushion Based on Body Sensor Network., , , and . GreenCom/iThings/CPScom, page 1103-1108. IEEE, (2013)An improved heuristic algorithm for founder sequence reconstruction from SNP recombinants., and . BMEI, page 854-858. IEEE, (2012)Security and privacy for database systems.. ADC, volume 124 of CRPIT, page 5. Australian Computer Society, (2012)The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems., , , and . IEEE Access, (2019)