Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-assisted complete analysis of three-photon hyperentangled Greenberger-Horne-Zeilinger states with nitrogen-vacancy centers in microcavities., , and . Quantum Inf. Process., 17 (7): 172 (2018)A systematical procedure in the construction of multi-level supersaturated design, , and . Journal of Statistical Planning and Inference, 115 (1): 287--310 (Jul 1, 2003)Creating real body model of dressed human based on fat extent of body., , , , and . Multimedia Tools Appl., 74 (17): 6951-6966 (2015)TrackCC: A Practical Wireless Indoor Localization System Based on Less-Expensive Chips., , , and . Sensors, 17 (6): 1391 (2017)Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?, , , , , , and . Comput. Hum. Behav., (2018)Principal characteristic networks for few-shot learning., , , , and . J. Vis. Commun. Image Represent., (2019)Error analysis for piecewise quadratic curve fitting algorithms., and . Comput. Aided Geom. Des., 3 (3): 205-215 (1986)A privacy-preserving mobile application recommender system based on trust evaluation., , and . J. Comput. Sci., (2018)Empowering Elasticsearch with Exact and Fast $r$-Neighbor Search in Hamming Space., , , , and . CoRR, (2019)Combining wavelet transform and POD to analyze wake flow., , and . J. Vis., 19 (2): 193-210 (2016)