Author of the publication

An R package for model fitting, model selection and the simulation for longitudinal data with dropout missingness.

, , , , and . Commun. Stat. Simul. Comput., 48 (9): 2812-2829 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Competitive Intelligence from Social Media: A Case Study of IBM., , and . PACIS, page 313. (2018)Flight Risk Probabilities During Wake Encountering Using Multivariate Copula Model., , , and . FSDM, volume 281 of Frontiers in Artificial Intelligence and Applications, page 200-205. IOS Press, (2015)Vanets: Case Study of a Peer-to-Peer Video Conferencing System., , and . CCNC, page 1-2. IEEE, (2009)Disentangling a Single MR Modality., , , , , , , and . DALI@MICCAI, volume 13567 of Lecture Notes in Computer Science, page 54-63. Springer, (2022)Cost Effective MLaaS Federation: A Combinatorial Reinforcement Learning Approach., , , and . INFOCOM, page 2078-2087. IEEE, (2022)A Transparent Encryption Scheme of Video Data for Android Devices., , , , and . CSE/EUC (1), page 817-822. IEEE Computer Society, (2017)Synthetic Sample Selection via Reinforcement Learning., , , , , , and . MICCAI (1), volume 12261 of Lecture Notes in Computer Science, page 53-63. Springer, (2020)The robust joint solution for channel assignment and routing for wireless mesh networks with time partitioning., and . Ad Hoc Networks, (2014)Examining Competitive Intelligence Using External and Internal Data Sources: A Text Mining Approach., , and . AMCIS, Association for Information Systems, (2015)Biometric verification using hand vein-patterns.. WCNIS, page 677-681. IEEE, (2010)