Author of the publication

A Worm Model Based on Artificial Life for Automatic Segmentation of Medical Images.

, , and . MIMI, volume 4987 of Lecture Notes in Computer Science, page 35-43. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Low-Overhead Circuit Obfuscation Technique with Multiplexers., , , , , , and . ACM Great Lakes Symposium on VLSI, page 133-136. ACM, (2016)A conflict-free approach for parallelizing SAT-based de-camouflaging attacks., , , and . ASP-DAC, page 259-264. IEEE, (2018)TCIM: Triangle Counting Acceleration With Processing-In-MRAM Architecture., , , , , , , , , and . DAC, page 1-6. IEEE, (2020)Research on Knowledge Transference Management of Knowledge Alliance., , and . CSEE (1), volume 214 of Communications in Computer and Information Science, page 143-148. Springer, (2011)Cell spreading optimization for force-directed global placers., , and . ISCAS, page 1-4. IEEE, (2017)D-VINS: Dynamic Adaptive Visual-Inertial SLAM with IMU Prior and Semantic Constraints in Dynamic Scenes., , , , , , and . Remote. Sens., 15 (15): 3881 (August 2023)Evaluation of Five Satellite-Based Precipitation Products for Extreme Rainfall Estimations over the Qinghai-Tibet Plateau., , , , , , and . Remote. Sens., 15 (22): 5379 (November 2023)A Worm Model Based on Artificial Life for Automatic Segmentation of Medical Images., , and . MIMI, volume 4987 of Lecture Notes in Computer Science, page 35-43. Springer, (2007)Research on Current Situation of Perceived Self-Efficacy of Hearing-Impaired Students Majoring in Artistic Specialties., and . BDCloud, page 248-251. IEEE Computer Society, (2015)Is the Secure IC camouflaging really secure?, , , and . ISCAS, page 1710-1713. IEEE, (2016)