Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Di Liu University of Stuttgart

Data for: The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. Dataset, (2024)Related to: Di Liu, Florian Kaiser, Vladislav Bushmakin, Erik Hesselmeier, Timo Steidl, Takeshi Ohshima, Nguyen Tien Son, Jawad Ul-Hassan, Öney O. Soykal, Jörg Wrachtrup (2023). The silicon vacancy centers in SiC: determination of intrinsic spin dynamics for integrated quantum photonics. arXiv preprint. arXiv: 2307.13648.
 

Other publications of authors with the same name

A sensory feedback system for prosthetic hand based on evoked tactile sensation., , , and . EMBC, page 2493-2496. IEEE, (2015)Scenario-based test case generation for state-based embedded systems., , , , and . IPCCC, page 335-342. IEEE, (2003)The improved linear multistep methods for differential equations with piecewise continuous arguments., and . Applied Mathematics and Computation, 217 (8): 4002-4009 (2010)Domain Decomposition Adaptive Algorithm with Wavelet Method to Trace Shock Wave., and . WAA, page 613-619. World Scientific, (2003)Robust profile face detection and rotation angle estimation of the driver's head in a novel dazzling avoidance system., , , and . Intelligent Vehicles Symposium, page 826-831. IEEE, (2015)Transonic flutter analysis using a fully coupled density based solver for inviscid flow., , and . Advances in Engineering Software, (2016)Delay-Dependent Robust H∞ Control for T-S Fuzzy Systems With Time Delay., and . IEEE Trans. Fuzzy Systems, 13 (4): 544-556 (2005)Strategies in Improving Android Security., , , , , and . PACIS, page 275. (2014)An integrated approach to robust speaker identification and speech recognition., , , , , , , , , and . IJCNN, page 1635-1639. IEEE, (2008)Social network analysis of the vulnerabilities of interdependent critical infrastructures., , , , , , , and . IJCIS, 4 (3): 256-273 (2008)