Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surface reconstruction using deformable models with interior and boundary constraints., and . ICCV, page 300-303. IEEE Computer Society, (1990)Surface Reconstruction Using Deformable Models with Interior and Boundary Constraints., and . IEEE Trans. Pattern Anal. Mach. Intell., 14 (5): 572-579 (1992)Intermolecular covalent interaction: 20-center-2-electron covalent π/π bonding in tetrathiafulvalene radical-cation dimer TTF·+-TTF·+., , , , , , and . J. Comput. Methods Sci. Eng., 10 (3-6): 357-366 (2010)Development and validation of a coagulation-related genes prognostic model for hepatocellular carcinoma., , , , , , , and . BMC Bioinform., 24 (1): 89 (December 2023)Production and Teaching Application of Micro-Video Resources for University Physics Experiments., , , , , and . ICEIT, page 367-372. IEEE, (2024)LOSC: efficient out-of-core graph processing with locality-optimized subgraph construction., , , , , , and . IWQoS, page 34:1-34:10. ACM, (2019)Research on SQL Injection Vulnerability Attack model., , and . CCIS, page 217-221. IEEE, (2018)FARMER: a novel approach to file access correlation mining and evaluation reference model for optimizing peta-scale file system performance., , , , and . HPDC, page 185-196. ACM, (2008)An improved MT-NT method for gross error detection and data reconciliation., , , and . Comput. Chem. Eng., 28 (11): 2189-2192 (2004)Non-intrusive leak monitoring system for pipeline within a closed space by wireless sensor network., , , , and . WCNC, page 1-6. IEEE, (2020)