Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TensorMD: Scalable Tensor-Diagram based Machine Learning Interatomic Potential on Heterogeneous Many-Core Processors., , , , , , , , , and 1 other author(s). CoRR, (2023)Implementing Global Information Technology Product in a Localized Context: An Exploratory Study of ERP System Implementation in China., , , and . Information Systems Perspectives and Challenges in the Context of Globalization, volume 254 of IFIP Conference Proceedings, page 185-198. Kluwer, (2003)Tag dictionary and its applications., , and . Multimedia Information Retrieval, page 397-400. ACM, (2010)Closed-Form Inverse Kinematics for Interventional C-Arm X-Ray Imaging With Six Degrees of Freedom: Modeling and Application., , , , , and . IEEE Trans. Med. Imaging, 31 (5): 1086-1099 (2012)A Novel Flexible Room Temperature Ethanol Gas Sensor Based on SnO2 Doped Poly-Diallyldimethylammonium Chloride., , , , and . Sensors, 13 (4): 4378-4389 (2013)F1: the fault-tolerant distributed RDBMS supporting google's ad business., , , , , , , , , and 2 other author(s). SIGMOD Conference, page 777-778. ACM, (2012)Digital Terrain Model Generation using LiDAR Ground Points., , and . UrbanGIS@SIGSPATIAL, page 9-15. ACM, (2015)A method for semantics-based conceptual expansion of ontology., , , and . SAC, page 1583-1587. ACM, (2008)Revealing common sources of image spam by unsupervised clustering with visual features., , , and . SAC, page 891-892. ACM, (2009)Detection of collusive interest flooding attacks in named data networking using wavelet analysis., , , , and . MILCOM, page 557-562. IEEE, (2017)