Author of the publication

Using Risk Dominance Strategy in Poker.

, , , , and . J. Inf. Hiding Multim. Signal Process., 5 (3): 555-566 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proximity Effects of Lateral Conductivity Variations on Geomagnetically Induced Electric Fields., , , and . IEEE Access, (2019)An Implementation of Learning Objects Management System., , and . ICWL, volume 3143 of Lecture Notes in Computer Science, page 393-399. Springer, (2004)Using Risk Dominance Strategy in Poker., , , , and . J. Inf. Hiding Multim. Signal Process., 5 (3): 555-566 (2014)Bounded-Size Rules: The Barely Subcritical Regime., , and . Comb. Probab. Comput., 23 (4): 505-538 (2014)Machinery New Emerge Fault Diagnosis Based on Deep Convolution Variational Autoencoder and Adaptive Label Propagation., and . IEEE Access, (2022)Enhanced Discriminate Feature Learning Deep Residual CNN for Multitask Bearing Fault Diagnosis With Information Fusion., , , , and . IEEE Trans. Ind. Informatics, 19 (1): 762-770 (2023)TransMVU: Multi-view 2D U-Nets with transformer for brain tumour segmentation., , , and . IET Image Process., 17 (6): 1874-1882 (May 2023)Improvement of a Distributed Algorithm for Solving Linear Equations., , and . IEEE Trans. Ind. Electron., 64 (4): 3113-3117 (2017)Odess: Speeding up Resemblance Detection for Redundancy Elimination by Fast Content-Defined Sampling., , , , , , and . ICDE, page 480-491. IEEE, (2021)Reliability Analysis of a Computer-Based Interlocking System with a Double 2-out-of-2 Redundancy Structure using Algebraic Binary Decision Diagrams., , and . QRS Companion, page 447-453. IEEE, (2022)