Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crisis of interspike intervals in Hodgkin-Huxley model, , , , and . Chaos, Solitons & Fractals, 27 (4): 952--958 (February 2006)SpellBound mp4 (USA)., and . SIGGRAPH ASIA Computer Animation Festival, page 16. ACM, (2016)Analysis of quantisation noise within signal band for sinusoidal signal., , , and . IET Commun., (2013)The structured total least squares algorithm research for passive location based on angle information., , and . Sci. China Ser. F Inf. Sci., 52 (6): 1043-1054 (2009)NLOS Effect Mitigation via Spatial Geometry Exploitation in Cooperative Localization., , , , and . IEEE Trans. Wirel. Commun., 19 (9): 6037-6049 (2020)To balance: balanced micro-expression recognition., , , , and . Multim. Syst., 28 (1): 335-345 (2022)Bootstrap Initialization of Nonparametric Texture Models for Tracking., and . ECCV (2), volume 1843 of Lecture Notes in Computer Science, page 119-133. Springer, (2000)A Blockchain Implementation of an Attendance Management System., , , , and . SOFL+MSVL, volume 11392 of Lecture Notes in Computer Science, page 169-182. Springer, (2018)A Complex Attacks Recognition Method in Wireless Intrusion Detection System., , , and . GPC, volume 11204 of Lecture Notes in Computer Science, page 3-17. Springer, (2018)Learning based on kernel discriminant-EM algorithm for image classification., , , and . ICASSP (5), page 461-464. IEEE, (2004)