Author of the publication

K-mer Counting for Genomic Big Data.

, , , , , , , and . BigData Congress, volume 10968 of Lecture Notes in Computer Science, page 345-351. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pattern Recognition of Growth Characteristics Based on UHF PD Signals of Electrical Tree., , , , and . IEEE Access, (2022)Adaptive trajectory-constrained exploration strategy for deep reinforcement learning., , , , and . CoRR, (2023)Penalized-likelihood PET Image Reconstruction Using 3D Structural Convolutional Sparse Coding., , , , , , and . CoRR, (2019)Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence., , , , and . IEEE BigData, page 1272-1277. IEEE, (2018)Reliability-Oriented Power Allocation for Multi-Source WPT Enabled Short Packet Communications., , , , and . ISWCS, page 1-6. IEEE, (2022)Direct estimation from list-mode data for reversible tracers using graphical modeling., , , , , and . ISBI, page 1204-1207. IEEE, (2015)Human Resources Analysis Based on Machine Learning.. ICITEE, page 470-477. ACM, (2023)Learning to Distill Graph Neural Networks., , , , , , , , and . WSDM, page 123-131. ACM, (2023)Knowledge-Adaptive Contrastive Learning for Recommendation., , , , , , and . WSDM, page 535-543. ACM, (2023)VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode., , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 199-218. Springer, (2019)