Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A event-based change detection method of cadastral database incremental updating., , , and . Mathematical and Computer Modelling, 51 (11-12): 1343-1350 (2010)Support of multilingual medical research., and . Artificial Intelligence in Medicine, 3 (3): 131-138 (1991)Exchange-induced band hybridization in InAs/GaSb based type II and broken-gap quantum well systems., , , , , and . Microelectronics Journal, 40 (4-5): 809-811 (2009)A new numerical approach to solve an elliptic equation., , and . Applied Mathematics and Computation, 171 (1): 1-24 (2005)On pre-detect template matching., and . IJCAT, 24 (3): 123-127 (2005)The cambridge university 2014 BOLT conversational telephone Mandarin Chinese LVCSR system for speech translation., , , , , and . INTERSPEECH, page 3145-3149. ISCA, (2015)Comments on Ä revisit to the gain and phase margins of linear quadratic regulators" with reply., , and . IEEE Trans. Automat. Contr., 46 (9): 1508-1509 (2001)An emerging cyberinfrastructure for biodefense pathogen and pathogen-host data., , , , , , , , , and 10 other author(s). Nucleic Acids Research, 36 (Database-Issue): 884-891 (2008)How to Commission, Operate and Maintain a Large Future Accelerator Complex from Far Remote, , , , , , , , and . CoRR, (2001)A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis., , , , and . European Journal of Operational Research, 250 (3): 855-864 (2016)