Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Carbon monoxide in an extremely metal-poor galaxy, , , , , , and . (2016)cite arxiv:1612.03980Comment: 12 pages, 3 figures, 1 table. Supplementary data at http://www.nature.com/article-assets/npg/ncomms/2016/161209/ncomms13789/extref/ncomms13789-s1.pdf.Efficient view-dependent out-of-core rendering of large-scale and complex scenes., , and . VRCIA, page 297-303. ACM, (2006)Minimal HCN emission from Molecular Clouds in M33, , and . (2011)cite arxiv:1104.3935 Comment: Accepted for publication in MNRAS.An evolutionary game theoretic analysis for crowdsourced WiFi networks., , , and . ICC, page 1-6. IEEE, (2017)Finite-time dissipative control for stochastic interval systems with time-delay and Markovian switching., , and . Appl. Math. Comput., (2017)Swarm intelligence algorithm for extracting spatial spectrum features of hyperspectral remote sensing image and decomposing mixed pixels., , , , and . J. Intell. Fuzzy Syst., 39 (4): 5045-5055 (2020)Attribute Reduction of Concept Lattice Based on Irreducible Elements., , and . Int. J. Wavelets Multiresolution Inf. Process., (2013)Studies on Sui Gu and Van Gogh's correspondence patterns from the empirical researches of human dynamics., , , , and . Int. J. Model. Identif. Control., 20 (3): 286-294 (2013)Novel observer design method for Lur'e differential inclusion systems., , and . Int. J. Syst. Sci., 47 (9): 2128-2138 (2016)Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things., , , , , , and . IEEE Trans. Ind. Informatics, 18 (2): 953-964 (2022)