Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , and . CSSE (3), page 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.Communication Characteristics in the NAS Parallel Benchmarks., and . IASTED PDCS, page 724-729. IASTED/ACTA Press, (2002)Automatic pectoral muscle boundary detection in mammograms based on Markov chain and active contour model., , , and . Journal of Zhejiang University - Science C, 11 (2): 111-118 (2010)Group Management Schemes for Implementing MPI collective Communication over IP-Multicast., , , and . JCIS, page 309-313. JCIS / Association for Intelligent Machinery, Inc., (2002)Coded aperture compressive temporal imaging, , , , , , , and . CoRR, (2013)An Improved Image Reconstruction Algorithm., , , and . CCIS, page 386-389. IEEE, (2018)Enhanced "vector-cross-product" direction-finding using a constrained sparse triangular-array., and . EURASIP J. Adv. Signal Process., (2012)Achievable Capacity Scaling Laws of Three-Dimensional Wireless Social Networks., , , , and . IEEE Trans. Vehicular Technology, 67 (3): 2671-2685 (2018)Snapshot Compressed Sensing: Performance Bounds and Algorithms., and . IEEE Trans. Inf. Theory, 65 (12): 8005-8024 (2019)"Vector Cross-Product Direction-Finding" With an Electromagnetic Vector-Sensor of Six Orthogonally Oriented But Spatially Noncollocating Dipoles/Loops., and . IEEE Trans. Signal Process., 59 (1): 160-171 (2011)