Author of the publication

Towards End-to-End Structure Solutions from Information-Compromised Diffraction Data via Generative Deep Learning.

, , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards End-to-End Structure Solutions from Information-Compromised Diffraction Data via Generative Deep Learning., , , , , , , and . CoRR, (2023)E-government: A Catalyst to Good Governance in China.. KMGov, volume 3035 of Lecture Notes in Computer Science, page 317-324. Springer, (2004)Towards a machine-readable literature: finding relevant papers based on an uploaded powder diffraction pattern., , , , , , , , , and 1 other author(s). CoRR, (2022)Pattern-based J2EE Application Deployment with Cost Analysis., , , and . SEKE, page 462-466. Knowledge Systems Institute Graduate School, (2007)A software architecture centric self-adaptation approach for Internetware., , , and . Sci. China Ser. F Inf. Sci., 51 (6): 722-742 (2008)Enhancing e-Democracy Via Fiscal Transparency: A Discussion Based on China's Experience.. TCGOV, volume 3416 of Lecture Notes in Computer Science, page 57-69. Springer, (2005)A Middleware-based Approach to Model Refactoring at Runtime., , , and . APSEC, page 246-253. IEEE Computer Society, (2007)Usability Analyses of Interactive Children's iPad StoryBook., and . HCI (27), volume 435 of Communications in Computer and Information Science, page 643-648. Springer, (2014)Determining Cockpit Dimensions and Associative Dimensions between Components in Cockpit of Ultralight Plane for Taiwanese., , , and . HCI (11), volume 5620 of Lecture Notes in Computer Science, page 365-374. Springer, (2009)Applying Human-Centered Design to Rehabilitation Device., and . HCI (5), volume 5614 of Lecture Notes in Computer Science, page 78-85. Springer, (2009)