Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of A Proxy Signature Scheme Based on the Elliptic Curve Cryptosystem., , and . Security and Management, page 58-64. CSREA Press, (2005)Linear dependence of deformed two-photon quadrature operators on spatial noncommutative parameter. Phys. Lett., (2006)Sub-10 nm Nanofabrication via Nanoimprint Directed Self-Assembly of Block Copolymers, , , , , , , and . ACS Nano, 0 (0): null (2011)A modified currency board system: Theory and evidence. Journal of International Financial Markets, Institutions and Money, 15 (4): 353--367 (October 2005)Rate of afferent stimulus dependent synchronization and coding in coupled neurons system, , , and . Chaos, Solitons & Fractals, 21 (5): 1221--1229 (September 2004)Towards Self-Exploring Discriminating Features., and . MLDM, volume 2123 of Lecture Notes in Computer Science, page 263-277. Springer, (2001)An embedded Node Operating System for real-time information interaction in Vehicle-to-Vehicle communication., , and . ITSC, page 887-892. IEEE, (2016)Tracking Nonstationary Visual Appearances by Data-Driven Adaptation., , , and . IEEE Trans. Image Process., 18 (7): 1633-1644 (2009)A performance analysis of multi-satellite joint geolocation., , and . Frontiers Inf. Technol. Electron. Eng., 17 (12): 1360-1387 (2016)A Multi-Feature Motion Posture Recognition Model Based on Genetic Algorithm., and . Traitement du Signal, 38 (3): 599-605 (2021)