Author of the publication

Extraversion mediates the relationship between structural variations in the dorsolateral prefrontal cortex and social well-being.

, , , , and . NeuroImage, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Di Liu University of Stuttgart

Data for: The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. Dataset, (2024)Related to: Di Liu, Florian Kaiser, Vladislav Bushmakin, Erik Hesselmeier, Timo Steidl, Takeshi Ohshima, Nguyen Tien Son, Jawad Ul-Hassan, Öney O. Soykal, Jörg Wrachtrup (2023). The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. arXiv preprint. arXiv: 2307.13648.
 

Other publications of authors with the same name

Generating Dynamic Box by Using an Input String., , , , and . MobiSec, volume 971 of Communications in Computer and Information Science, page 17-29. Springer, (2017)Magnetic and HFEPR Studies of Exchange Coupling in a Series of it mu-Cl Dicobalt Complexes, , , , , , , and . Inorganic chemistry, 56 (5): 2417-2425 (2017)A novel efficient decoding algorithm for CDHMM-based speech recognizer on chip., , , and . ICASSP (2), page 293-296. IEEE, (2003)Multiple Background Models for Speaker Verification., , and . Odyssey, page 9. ISCA, (2010)A CMLLR supervector kernel for SVM language recognition., and . ICASSP, page 4998-5001. IEEE, (2010)Two-Stage Method for Specific Audio Retrieval., and . ICASSP (4), page 85-88. IEEE, (2007)Rejection based on a posteriori probability estimated by MLP with application for Mandarin voice dialer on ASIC., , and . ICASSP, page 3446-3449. IEEE, (2000)Soil Drought Anomalies in MODIS GPP of a Mediterranean Broadleaved Evergreen Forest., , and . Remote Sensing, 7 (1): 1154-1180 (2015)Physical layer security-aware routing and performance tradeoffs in ad hoc networks., , , , and . Computer Networks, (2017)End-to-End Delay Modeling in Buffer-Limited MANETs: A General Theoretical Framework., , , , and . IEEE Trans. Wireless Communications, 15 (1): 498-511 (2016)