Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting reweighted graph total variation blind deconvolution and beyond., , , , and . Vis. Comput., 40 (5): 3119-3135 (May 2024)Spatiotemporal crime analysis in U.S. law enforcement agencies: Current practices and unmet needs., , , , and . Gov. Inf. Q., 30 (3): 226-240 (2013)Periodic solutions for nonlinear second-order difference equations., , and . Appl. Math. Comput., 184 (2): 685-694 (2007)New multiplicative perturbation bounds for the generalized polar decomposition., , and . Appl. Math. Comput., (2018)Progress supervision information system for GIP with ACS., , and . Kybernetes, 41 (10): 1526-1545 (2012)Using Models to Improve Stereo Reconstruction., and . IEEE Trans. Pattern Anal. Mach. Intell., 14 (2): 269-277 (1992)Volunteered geographic services: developing a linked data driven location-based service., , , , , and . GIS-SSO, page 25-31. ACM, (2011)SAR Image Retrieval Based on Unsupervised Domain Adaptation and Clustering., , , , and . IEEE Geosci. Remote. Sens. Lett., 16 (9): 1482-1486 (2019)Hash-Chain Improvement of Key Predistribution Schemes Based on Transversal Designs., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (1): 157-159 (2018)Predicting the Impact of Android Malicious Samples via Machine Learning., , , , , and . IEEE Access, (2019)