Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Speed Fluorescence Imaging and Intensity Profiling of Femtosecond-Induced Calcium Transients., , and . Int. J. Biomedical Imaging, (2006)Mechanical Strains Induced in Osteoblasts by Use of Point Femtosecond Laser Targeting., , , , and . Int. J. Biomedical Imaging, (2006)Dense representative tooth landmark/axis detection network on 3D model., , , , , , , and . Comput. Aided Geom. Des., (2022)Brain-inspired GCN: Modularity-based Siamese simple graph convolutional networks., , and . Inf. Sci., (February 2024)An enhanced short text categorization model with deep abundant representation., , , , , , and . World Wide Web, 21 (6): 1705-1719 (2018)TACTICS, an interactive platform for customized high-content bioimaging analysis., , , , and . Bioinform., 29 (6): 817-818 (2013)An Implicit Parametric Morphable Dental Model., , , , , and . ACM Trans. Graph., 41 (6): 217:1-217:13 (2022)Comparison of Performance between Different Selection Strategies on Simple Genetic Algorithms., , , and . CIMCA/IAWTIC, page 1115-1121. IEEE Computer Society, (2005)Syntactic Categorization and Semantic Interpretation of Chinese Nominal Compounds., , , , , , and . NLPCC/ICCPOL, volume 10102 of Lecture Notes in Computer Science, page 51-62. Springer, (2016)Understanding How Components of Organisations Contribute to Attacks., , and . NordSec, volume 10014 of Lecture Notes in Computer Science, page 54-66. (2016)