Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. Dongren Wang University of Stuttgart

Replication data of Buchmeiser group for: "Stereoselective Ring Expansion Metathesis Polymerization with Cationic Molybdenum Alkylidyne N-Heterocyclic Carbene Complexes", , , , , , , and . Dataset, (2024)Related to: Patrick Probst, Jonas Groos, Dongren Wang, Alexander Beck, Katrin Gugeler, Johannes Kästner, Wolfgang Frey, and Michael R. Buchmeiser, Stereoselective Ring Expansion Metathesis Polymerization with Cationic Molybdenum Alkylidyne N-Heterocyclic Carbene Complexes, Journal of the American Chemical Society 2024 146 (12), 8435-8446. doi: 10.1021/jacs.3c14457.

Yao Wang University of Stuttgart

VisRecall++: Analysing and Predicting Recallability of Information Visualisations from Gaze Behaviour (Dataset and Reproduction Data), and . Software, (2024)Related to: Y. Wang, Y. Jiang, Z. Hu, C. Ruhdorfer, M. Bâce, A. Bulling. "VisRecall++: Analysing and Predicting Recallability of Information Visualisations from Gaze Behaviour", in Proceedings of the ACM on Human-Computer Interaction (PACM HCI). doi: 10.1145/3655613.
 

Other publications of authors with the same name

A Fault Localization Framework to Alleviate the Impact of Execution Similarity., , , and . International Journal of Software Engineering and Knowledge Engineering, 23 (7): 963-998 (2013)An OpenCL micro-benchmark suite for GPUs and CPUs., , , and . The Journal of Supercomputing, 69 (2): 693-713 (2014)Image authentication based on perceptual hash using Gabor filters., , , , and . Soft Comput., 15 (3): 493-504 (2011)Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect., , , , and . ICYCS, page 2149-2153. IEEE Computer Society, (2008)The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative., , , , and . CIS, page 124-128. IEEE Computer Society, (2014)Research on Evaluation of Trust Model., , and . CIS (1), page 345-349. IEEE Computer Society, (2008)Using Game Theory to Reveal Vulnerability for Complex Networks., , and . CIT, page 978-984. IEEE Computer Society, (2010)An Adaptive JPEG Double Compression Steganographic Scheme Based on Irregular DCT Coefficients Distribution., , , and . IEEE Access, (2019)A procedural texture generation framework based on semantic descriptions., , , , , and . Knowl.-Based Syst., (2019)Evaluation of a novel visualization for dynamic social networks., , , and . VINCI, page 5:1-5:8. ACM, (2019)