Author of the publication

A theory for the risk bound of myoelectric control with adaptive learning.

, , , , , , and . ROBIO, page 1676-1681. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated Test-Architecture Optimization and Thermal-Aware Test Scheduling for 3-D SoCs Under Pre-Bond Test-Pin-Count Constraint., , , and . IEEE Trans. VLSI Syst., 20 (9): 1621-1633 (2012)Quantification of creep strain in small lead-free solder joints with the in situ micro electronic-resistance measurement., , , , and . Microelectronics Reliability, 48 (3): 438-444 (2008)Commutative encryption and watermarking based on orthogonal decomposition., , and . Multimedia Tools Appl., 70 (3): 1617-1635 (2014)The implications of postponement on contract design and channel performance.. European Journal of Operational Research, 216 (2): 356-366 (2012)MCA: an end-to-end multicast congestion avoidance scheme with feedback suppression., and . Computer Communications, 27 (13): 1264-1277 (2004)Efficient and incentive-compatible resource allocation mechanism for P2P-assisted content delivery systems., , , and . Future Generation Comp. Syst., 29 (6): 1611-1620 (2013)Fuzzy dynamic characteristic model based attitude control of hypersonic vehicle in gliding phase., and . SCIENCE CHINA Information Sciences, 54 (3): 448-459 (2011)Extending intransitive noninterference with probabilities in information flow security., , and . IMSCCS, page 337-343. IEEE Computer Society, (2007)From keywords to social tags: Tagging for dialogues., , , , and . NLPKE, page 106-113. IEEE, (2011)Evaluation method for node importance based on node condensation in terrorism networks., , , , and . ISI, page 193. IEEE, (2012)