Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Process Algebra with Value-Passing and Weak Time Restrictions., , and . JSW, 6 (5): 769-782 (2011)A New Method of Data Preprocessing for Network Security Situational Awareness., , and . DBTA, page 1-4. IEEE, (2010)Bisimulation-based Consistency Checking on Syndrome Feng-Shi-Re-Bi in Rheumatoid Arthritis., , , , , , and . JSW, 9 (3): 536-540 (2014)TargetNet: a web service for predicting potential drug-target interaction profiling via multi-target SAR models., , , , , , , , and . Journal of Computer-Aided Molecular Design, 30 (5): 413-424 (2016)Rule-based text mining of traditional Chinese medicine patterns with Chinese herbal medicines and formulae on hypertension., , , , , , , , , and 4 other author(s). BIBM, page 332-335. IEEE Computer Society, (2013)Searching association rules of traditional Chinese medicine on Ligusticum wallichii by text mining., , , , , , and . BIBM, page 162-167. IEEE Computer Society, (2013)Using text mining to understand traditional Chinese medicine pathogenesis of nonalcoholic fatty liver disease., , , , , , and . BIBM, page 311-314. IEEE Computer Society, (2013)Exploring potential therapeutic agents of Duhuo-Jisheng-Tang for rheumatoid arthritis., , , , , , and . BIBM, page 476-479. IEEE Computer Society, (2014)Systems pharmacology in drug discovery and therapeutic insight for herbal medicines., , , , , and . Briefings in Bioinformatics, 15 (5): 710-733 (2014)Large-scale exploration and analysis of drug combinations., , , , , , , , , and 5 other author(s). Bioinformatics, 31 (12): 2007-2016 (2015)