Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of AI-Based TCM Prescription Analysis Applet., , , , , , , and . ACCC, page 13-18. IEEE, (2022)The LAMOST Survey of Background Quasars in the Vicinity of the Andromeda and Triangulum Galaxies -- II. Results from the Commissioning Observations and the Pilot Surveys, , , , , , , , , and 61 other author(s). (2013)cite arxiv:1304.3174Comment: 26 pages, 6 figures, AJ accepted.The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical Model., and . WISM (1), volume 6987 of Lecture Notes in Computer Science, page 283-293. Springer, (2011)Approximate model of cooperative activation and crossbridge cycling in cardiac muscle using ordinary differential equations., , , and . Biophys J, 95 (5): 2368--2390 (September 2008)Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users., and . CISS, page 1-6. IEEE, (2017)Aspect Ratio Effects on Reconfigurable Computing., , and . ERSA, page 71-77. CSREA Press, (2005)Efficient Maximum Margin Clustering via Cutting Plane Algorithm., , and . SDM, page 751-762. SIAM, (2008)The micro-structure of Shangjuxu acupoint (ST37) by X-ray phase-contrast CT imaging based on synchrotron radiation., , , , , , , , and . BMEI, page 85-89. IEEE, (2014)Regularized clustering for documents., , and . SIGIR, page 95-102. ACM, (2007)An LPI design for secure burst communication systems., , , and . ChinaSIP, page 631-635. IEEE, (2014)