Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimization of Triangular Matrix Functions in BLAS Library on Loongson2F., , and . NPC, volume 6289 of Lecture Notes in Computer Science, page 35-45. Springer, (2010)Distance self-attention network method for remaining useful life estimation of aeroengine with parallel computing., , , , and . Reliab. Eng. Syst. Saf., (2022)An authorisation certificate-based access control model., , , , and . Int. J. Secur. Networks, 16 (4): 258-266 (2021)A Component-based Modeling and simulation Supporting Environment., and . Int. J. Model. Simul. Sci. Comput., 4 (4): 1342006 (2013)Phase recovery and holographic image reconstruction using deep learning in neural networks., , , , and . CoRR, (2017)Self-relation attention networks for weakly supervised few-shot activity recognition., , , , , , and . Knowl. Based Syst., (2023)A Fair Rate-Balance link Scheduling in WiMAX Mesh network., , , , and . WCNIS, page 355-359. IEEE, (2010)A Tight Coupling Cooperation Scheme with QoS Provisioning in WiFi/WiMAX Networks., , , , and . Int. J. Comput. Commun. Control, 8 (3): 460-468 (2013)Support vector machines-based pre-calculation error for structural reliability analysis., , , and . Eng. Comput., 40 (1): 477-491 (February 2024)MinePhos: A Literature Mining System for Protein Phoshphorylation Information Extraction., , and . IEEE ACM Trans. Comput. Biol. Bioinform., 9 (1): 311-315 (2012)