Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Robust Method for Transcript Quantification with RNA-Seq Data., , , , , , , and . J. Comput. Biol., 20 (3): 167-187 (2013)A fast real-time memory authentication protocol., , and . STC, page 31-40. ACM, (2008)A Robust Method for Transcript Quantification with RNA-seq Data., , , , , , , and . RECOMB, volume 7262 of Lecture Notes in Computer Science, page 127-147. Springer, (2012)An Improved Bayesian Algorithm for Filtering Spam E-Mail., and . IPTC, page 87-90. IEEE Computer Society, (2011)Research and Implementation of Packet Classification Based on NDIS Intermediate Layer under Windows Platform., and . IPTC, page 157-160. IEEE Computer Society, (2011)Spatial averaging and ordering in matched element arrays., , , , and . CICC, page 453-456. IEEE, (2002)Two-Dimensional DOA Estimation of MIMO Radar Coherent Source Based on Toeplitz Matrix Set Reconstruction., , and . Secur. Commun. Networks, (2021)Multi-hop community question answering based on multi-aspect heterogeneous graph., , , , , and . Inf. Process. Manag., 61 (1): 103543 (January 2024)Unsupervised learning of high-order structural semantics from images., , , and . ICCV, page 2122-2129. IEEE Computer Society, (2009)Delegatability of an Identity Based Strong Designated Verifier Signature Scheme., , , and . Informatica, 21 (1): 117-122 (2010)