Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rectangular corner cutting and Sylvester A-resultants., and . ISSAC, page 301-308. ACM, (2000)A metagenome-wide association study of gut microbiota in type 2 diabetes, , , , , , , , , and 46 other author(s). Nature, 490 (7418): 55--60 (Oct 4, 2012)Latency inflation with MPLS-based traffic engineering., , , , and . Internet Measurement Conference, page 463-472. ACM, (2011)Logic soft errors in sub-65nm technologies design and CAD challenges., , , and . DAC, page 2-4. ACM, (2005)Low-rank plus sparse reconstruction using dictionary learning for 3D-MRI., , , and . CISP-BMEI, page 1407-1411. IEEE, (2016)Optimization design of the Dickson charge pump circuit with a resistive load., and . ISCAS (5), page 840-843. IEEE, (2004)New implementation of time domain measurement of quality factor., , , , and . ISCAS, page 1700-1703. IEEE, (2013)Manipulating quantum information on the controllable systems or subspaces., , and . CoRR, (2010)Research on intelligent scheduling strategy of elevator group under the big data platform., , , , and . Int. J. Internet Protoc. Technol., 13 (2): 85-93 (2020)A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources., , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 93-112. Springer, (2015)