Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach., , , and . EUC, volume 3207 of Lecture Notes in Computer Science, page 869-878. Springer, (2004)Numerical simulation and experiment of medium flow energy field in vibrating mill., , , , and . IJMSSC, 9 (2): 1850011:1-1850011:19 (2018)Dynamic numerical simulation on grinding medium flow field for vibration mill under various vibrating amplitude-frequency combination conditions., , , and . IJMSSC, 6 (1): 1550004:1-1550004:13 (2015)ATAC: a 1000-core cache-coherent processor with on-chip optical network., , , , , , , and . PACT, page 477-488. ACM, (2010)Synthetic extracellular matrices with tailored adhesiveness and degradability support lumen formation during angiogenic sprouting, , , , , , , and . Nature Communications, 12 (1): 3402 (Jun 7, 2021)Research and Application of Cow Estrus Detection Based on the Internet of Things., , , , , , , , , and 3 other author(s). CSE/EUC (1), page 665-667. IEEE Computer Society, (2017)Research on Functional Description, Operation and Organizational Model of a Loosely Coupled System., , and . ICIME, page 52-56. ACM, (2016)Simulating 50 keV X-ray Photon Detection in Silicon with a Down-Conversion Layer., , , , and . Sensors, 21 (22): 7566 (2021)