Author of the publication

The Role of the Frontal and Parietal Cortex in Proactive and Reactive Inhibitory Control: A Transcranial Direct Current Stimulation Study.

, , , , , , , and . J. Cogn. Neurosci., 28 (1): 177-186 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Message Transmission Scheme Based on the Detection of Interest Community in Mobile Social Networks., , , and . MSN, volume 747 of Communications in Computer and Information Science, page 70-83. Springer, (2017)A Survey on Service Migration Strategies for Vehicular Edge Computing., , and . ICBDS, volume 1563 of Communications in Computer and Information Science, page 473-487. Springer, (2021)A Reputation-based Trust Management in Peer-to-Peer Network Systems., , , and . PDCS, page 510-515. ISCA, (2004)Leveraging Broadband Access for True On-Demand Delivery of Internet Videos., , and . SAINT, page 171-177. IEEE Computer Society, (2004)The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm., , and . INCoS, page 229-236. IEEE, (2012)Spatio-Temporal Check-in Time Prediction with Recurrent Neural Network based Survival Analysis., , and . IJCAI, page 2976-2983. ijcai.org, (2018)Face attribute prediction with convolutional neural networks., , , , and . ROBIO, page 1294-1299. IEEE, (2017)Policy to cope with deadlocks and livelocks for flexible manufacturing systems using the max′-controlled new smart siphons, , , , , , and . Control Theory & Applications, IET, 8 (16): 1607--1616 (2014)Scenario Driven Lifecycle Automation of Net-Centric Simulation., , , , and . AsiaSim (2), volume 324 of Communications in Computer and Information Science, page 413-420. Springer, (2012)Feeling-based location privacy protection for location-based services., and . ACM Conference on Computer and Communications Security, page 348-357. ACM, (2009)