Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Safety-Helmet Detection Algorithm Based on Attention Mechanism., and . IC-NIDC, page 11-15. IEEE, (2021)Configuring business process models., , , and . ACM SIGSOFT Softw. Eng. Notes, 38 (4): 1-10 (2013)MDAnet: Multiple Fusion Network with Double Attention for Visual Question Answering., , and . ICVIP, page 143-147. ACM, (2019)An Improved MST Clustering Algorithm Based on Membrane Computing., and . HCC, volume 10745 of Lecture Notes in Computer Science, page 1-12. Springer, (2017)Factorial analysis of error correction performance using simulated next-generation sequencing data., , , , , and . BIBM, page 1164-1169. IEEE Computer Society, (2016)An auxiliary attention-based network for joint classification and localization of breast tumor on ultrasound images., , , , , , , , and . Medical Imaging: Image Processing, volume 12464 of SPIE Proceedings, SPIE, (2023)Dynamic semantics of OWL-S in CSP-OZ., , , and . ACSD, page 208-213. IEEE, (2008)Formal Analysis of OWL-S Process Model by FDR., , and . APSCC, page 215-222. IEEE Computer Society, (2011)Executability Analysis for Semantically Annotated Process Model., , , and . APSCC, page 117-124. IEEE Computer Society, (2012)Towards Robust Bone Age Assessment: Rethinking Label Noise and Ambiguity., , , and . MICCAI (6), volume 12266 of Lecture Notes in Computer Science, page 621-630. Springer, (2020)