Author of the publication

Free energy simulations reveal a double mutant avian H5N1 virus hemagglutinin with altered receptor binding specificity.

, , , and . Journal of Computational Chemistry, 30 (11): 1654-1663 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

M.Sc. Yunxuan Li University of Stuttgart

CV-Priv : Towards a Context Model for Privacy Policy Creation for Connected Vehicles, , and . 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), page 583-588. IEEE, (2023)
CV-Priv : Towards a Context Model for Privacy Policy Creation for Connected Vehicles, , and . 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), page 583-588. IEEE, (2023)Privacy in Connected Vehicles: Perspectives of Drivers and Car Manufacturers, , , , and . Service-Oriented Computing : 17th Symposium and Summer School, SummerSOC 2023, Heraklion, Crete, Greece, June 25 – July 1, 2023, Revised Selected Papers, 1847, page 59-68. Cham, Springer, (2023)
 

Other publications of authors with the same name

Intentional Forwarding: Providing reliable and real-time delivery in the presence of body shadowing in breadcrumb systems., , , , , and . PIMRC, page 687-692. IEEE, (2012)LSDH: A Hashing Approach for Large-Scale Link Prediction in Microblogs., , , , and . AAAI, page 3120-3121. AAAI Press, (2014)Color Image Filtering Methods for Variable Spray Systems., , , and . Intelligent Automation & Soft Computing, 18 (5): 453-460 (2012)A Wavelet Approach for the Analysis of Folding Trajectory of Protein Trp-cage., , , , , and . J. Bioinformatics and Computational Biology, 3 (6): 1351-1370 (2005)Process Mining for Trauma Resuscitation., , , , , and . IEEE Intelligent Informatics Bulletin, 18 (1): 15-19 (2017)Training Opinion Leaders in Microblog: A Game Theory Approach., , , and . CGC, page 754-759. IEEE Computer Society, (2012)Discovering Interpretable Medical Workflow Models., , , , , and . ICHI, page 437-439. IEEE Computer Society, (2018)Remote physiological monitoring of first responders with intermittent network connectivity., , , , , , and . Wireless Health, page 64-73. ACM, (2010)Stochastic game net and applications in security analysis for enterprise network., , , , , and . Int. J. Inf. Sec., 11 (1): 41-52 (2012)The Competition of User Attentions Among Social Network Services: A Social Evolutionary Game Approach., , , , and . APWeb (1), volume 9931 of Lecture Notes in Computer Science, page 268-279. Springer, (2016)