Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HCI and NBTI induced degradation in gate-all-around silicon nanowire transistors., , , , , , , , and . Microelectronics Reliability, 51 (9-11): 1515-1520 (2011)Integrating relevance vector machines and genetic algorithms for optimization of seed-separating process., , , and . Eng. Appl. of AI, 20 (7): 970-979 (2007)Adaptive spherical Gaussian kernel in sparse Bayesian learning framework for nonlinear regression., , , and . Expert Syst. Appl., 36 (2): 3982-3989 (2009)QCWS: an implementation of QoS-capable multimedia web services., and . Multimedia Tools Appl., 30 (2): 165-187 (2006)Information Distribution of the Central Projection Method for Chinese Character Recognition., , , and . J. Inf. Sci. Eng., 16 (1): 127-139 (2000)The pattern of grey fuzzy forecasting with feedback., , , , and . Kybernetes, 41 (5/6): 568-576 (2012)A Threshold Algorithm Based on the Local Information., , and . ICRA (3), page 1012. IEEE Computer Society Press, (1993)A Bayesian approach to voice activity detection using multiple statistical models and discriminative training., and . INTERSPEECH, page 3114-3117. ISCA, (2010)A hierarchical architecture for improving scalability and consistency in CVE systems., , and . IJPEDS, 26 (3): 179-205 (2011)INC: a new type of computer numerical control., , and . CSCWD (2), page 787-792. IEEE Computer Society, (2005)1-84600-002-5.