Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A coarse-grained stream architecture for cryo-electron microscopy images 3D reconstruction., , , , , , and . FPGA, page 143-152. ACM, (2012)EDTree: Emotional Dialogue Trees for Game Based Training., , , , , , and . Edutainment, volume 9654 of Lecture Notes in Computer Science, page 77-84. Springer, (2016)Cross-Platform Cloth Simulation API for Games., , , and . Edutainment, volume 9654 of Lecture Notes in Computer Science, page 224-232. Springer, (2016)Virtual reality safety training using deep EEG-net and physiology data., , , , and . Vis. Comput., 38 (4): 1195-1207 (2022)De Re Updates., , and . TARK, volume 335 of EPTCS, page 103-117. (2021)Simulating Virtual Character's Learning Behaviour as An Evolutionary Process Using Genetic Algorithms., and . WSCG (Short Papers), page 137-144. (2002)A constrained inverse kinematics technique for real-time motion capture animation., , , and . Vis. Comput., 15 (7/8): 413-425 (1999)A service integrity assurance framework for cloud computing based on MapReduce., and . CCIS, page 240-244. IEEE, (2012)Building a web collection for online surveillance of U.S. domestic terrorism., and . ISI, page 195. IEEE, (2012)An Efficient Human Body Contour Extraction Method for Mobile Apps., , , , and . Edutainment, volume 10345 of Lecture Notes in Computer Science, page 173-181. Springer, (2017)