Author of the publication

Structured Regularized Robust Coding for Face Recognition.

, , , and . CCCV (2), volume 547 of Communications in Computer and Information Science, page 80-89. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Di Liu University of Stuttgart

Data for: The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. Dataset, (2024)Related to: Di Liu, Florian Kaiser, Vladislav Bushmakin, Erik Hesselmeier, Timo Steidl, Takeshi Ohshima, Nguyen Tien Son, Jawad Ul-Hassan, Öney O. Soykal, Jörg Wrachtrup (2023). The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. arXiv preprint. arXiv: 2307.13648.
 

Other publications of authors with the same name

Service organization and recommendation using multi-granularity approach., , , , and . Knowl.-Based Syst., (2015)Dynamics of the noisy neural network., , and . Biological Cybernetics, 77 (3): 217-224 (1997)An Exposed-Terminal-Eliminated Dual-Channel MAC Protocol for Exploiting Concurrent Transmissions in Multihop Wireless Networks., , and . TIIS, 8 (3): 778-798 (2014)Impulsive control of bifurcations., , , and . Mathematics and Computers in Simulation, 79 (7): 2180-2191 (2009)Improving the visual quality of size invariant visual cryptography scheme., , , and . J. Visual Communication and Image Representation, 23 (2): 331-342 (2012)Building a validation measure for activity-based transportation models based on mobile phone data., , , , , and . Expert Syst. Appl., 41 (14): 6174-6189 (2014)Robust THP Transceiver Design for MIMO Interference Channel., , , and . IEEE Communications Letters, 19 (9): 1640-1643 (2015)Colour visual cryptography schemes., , and . IET Information Security, 2 (4): 151-165 (2008)Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners., and . IET Information Security, 5 (2): 121-128 (2011)A control algorithm for rapid movements near the radius compensation singularity in five-axis end milling., , , , , and . J. Systems Science & Complexity, 26 (5): 718-734 (2013)