Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust exponential stabilization of Networked Switched Control Systems., , and . CCA/ISIC, page 13-18. IEEE, (2009)Global Bounded Synchronization of General Dynamical Networks With Nonidentical Nodes., , and . IEEE Trans. Automat. Contr., 57 (10): 2656-2662 (2012)Variational Attention for Commonsense Knowledge Aware Conversation Generation., , , and . NLPCC (1), volume 11838 of Lecture Notes in Computer Science, page 3-15. Springer, (2019)A lightweight CaaS private cloud architecture and models for many task computing., , and . ICCSE, page 92-96. IEEE, (2019)Employing External Rich Knowledge for Machine Comprehension., , , , and . IJCAI, page 2929-2925. IJCAI/AAAI Press, (2016)Unsupervised Story Comprehension with Hierarchical Encoder-Decoder., , , , , , and . ICTIR, page 93-100. ACM, (2019)Accelerating the reconstruction of magnetic resonance imaging by three-dimensional dual-dictionary learning using CUDA., , , , and . EMBC, page 2412-2415. IEEE, (2014)Succession of potential vegetation in arid area of northwest China., , , , and . Geoinformatics, page 1-6. IEEE, (2010)Sharp transitions in random key graphs.. Allerton, page 1182-1188. IEEE, (2015)Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links.. CoRR, (2019)