Author of the publication

Using Wireless EEG Signals to Assess Memory Workload in the n-Back Task.

, , and . IEEE Trans. Hum. Mach. Syst., 46 (3): 424-435 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applied optimization and data mining., , , and . Ann. Oper. Res., 249 (1-2): 1-3 (2017)Using Wireless EEG Signals to Assess Memory Workload in the n-Back Task., , and . IEEE Trans. Hum. Mach. Syst., 46 (3): 424-435 (2016)Characterizations of Local Recoding Method on k-Anonymity., , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 648-658. Springer, (2018)Voxel Selection Framework in Multi-Voxel Pattern Analysis of fMRI Data for Prediction of Neural Response to Visual Stimuli., , , , , and . IEEE Trans. Med. Imaging, 33 (4): 925-934 (2014)Uncovering Dynamic Functional Connectivity of Parkinson's Disease Using Topological Features and Sparse Group Lasso., , , , , , and . BI, volume 11309 of Lecture Notes in Computer Science, page 423-434. Springer, (2018)Data privacy preservation algorithm with k-anonymity., , and . World Wide Web, 24 (5): 1551-1561 (2021)A decision support model for staff allocation of mobile medical service., , , , , and . Ann. Oper. Res., 249 (1-2): 433-448 (2017)Set covering approach for reconstruction of sibling relationships., , , and . Optim. Methods Softw., 22 (1): 11-24 (2007)Manufacturing Resource Modeling for Cloud Manufacturing., , and . Int. J. Intell. Syst., 32 (4): 414-436 (2017)Data anonymization: a novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoT., , and . Serv. Oriented Comput. Appl., 14 (2): 89-100 (2020)