Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A generalization of parameterized inexact Uzawa method for singular saddle point problems., and . Appl. Math. Comput., 219 (9): 4225-4231 (2013)Automated classification of protein expression levels in immunohistochemistry images to improve the detection of cancer biomarkers., , , , and . BMC Bioinform., 23 (1): 470 (2022)Multi-agent Pursuit-Evasion Algorithm Based on Contract Net Interaction Protocol., , and . ICNC (3), volume 3612 of Lecture Notes in Computer Science, page 482-489. Springer, (2005)A Highly Efficient Implementation of I/O Functions on GPU., , , and . IPDPS Workshops, page 2378-2383. IEEE Computer Society, (2012)A non-stationary iterative Tikhonov regularization method for simultaneous inversion in a time-fractional diffusion equation., , and . J. Comput. Appl. Math., (July 2023)Strategic Choice of Electronic Marketplace Functionalities: A Buyer-Supplier Relationship Perspective., and . J. Comput. Mediat. Commun., (2004)Pre-distortion based joint transmission., , , , and . VTC Spring, page 493-496. IEEE, (2002)Readability is decreasing in language and linguistics., , and . Scientometrics, 127 (8): 4697-4729 (2022)A Comparison of Transit Signal Priority Strategies with Multi-step Detection at Isolated Intersections., , , and . ITSC, page 1684-1689. IEEE, (2015)Revisiting the Relationship between Information Technology Infrastructure and E-Commerce Performance: A Generativity Perspective.. AMCIS, Association for Information Systems, (2017)