Author of the publication

Special Issue: Selected Papers of the Inaugural DahShu Data Science Symposium: Computational Precision Health (CPH 2017).

, , , , , , , and . Journal of Computational Biology, 24 (7): 635-636 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crosstalk Noise in WDM-Based Optical Networks-on-Chip: A Formal Study and Comparison., , , , , , , , , and . IEEE Trans. VLSI Syst., 23 (11): 2552-2565 (2015)A Distributed Algorithm of Appliance Scheduling for Home Energy Management System., , and . IEEE Trans. Smart Grid, 5 (1): 282-290 (2014)A consolidation algorithm for multicast service using proportional control and neural network predictive techniques., , , and . Computer Communications, 29 (1): 114-122 (2005)Further studies on LMI-based relaxed stabilization conditions for nonlinear systems in Takagi-Sugeno's form., , and . Automatica, 42 (3): 503-508 (2006)Spectral clustering with density sensitive similarity function., , and . Knowl.-Based Syst., 24 (5): 621-628 (2011)Throughput capacity of wireless networks with social features., , , and . WCSP, page 1-6. IEEE, (2013)Throughput analysis of cognitive radio networks via stochastic network calculus., , and . WCSP, page 1-6. IEEE, (2014)Delay-bounded MAC with minimal idle listening for sensor networks., , , and . INFOCOM, page 1314-1322. IEEE, (2011)Streaming Fact Extraction for Wikipedia Entities at Web-Scale., , , , and . FLAIRS Conference, AAAI Press, (2014)Density Based Outlier Mining Algorithm with Application to Intrusion Detection., and . PACIIA (1), page 511-514. IEEE Computer Society, (2008)