Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asymptotic Laplacian-energy-like invariant of lattices., , , and . Applied Mathematics and Computation, (2015)Interlayer Cooling Network Design for High-Performance 3D ICs Using Channel Patterning and Pruning., , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 37 (4): 770-781 (2018)Application of quorum response and information entropy to animal collective motion modeling., , , and . Complexity, 21 (S1): 584-592 (2016)Sensor Integration to LTE/LTE-A Network through MC-CDMA and Relaying., , , and . VTC Spring, page 1-5. IEEE, (2012)Constraints-based graph embedding optimal surveillance-video mosaicing., , and . ACPR, page 311-315. IEEE, (2011)Huge Data Mining Based on Rough Set Theory and Granular Computing., and . Web Intelligence/IAT Workshops, page 655-658. IEEE Computer Society, (2008)978-0-7695-3496-1.Piece-wise linear approximation solution to the estimate-and-forward relay with the Bayesian estimator., , and . WPMC, page 1-4. IEEE, (2011)Enhancement of Micro-Images Using Feature Linking Model for Cerebellum of Alligator sinensis., , , and . IEEE Access, (2019)How do tourists evaluate Chinese hotels at different cities? Mining online tourist reviewers for new insights., , , and . WHICEB, page 67. Association for Information Systems, (2016)Quantum computing cryptography: Unveiling cryptographic Boolean functions with quantum annealing., , , , , , and . CoRR, (2018)