Author of the publication

Adaptive dynamic programming as a theory of sensorimotor control.

, and . Biol. Cybern., 108 (4): 459-473 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing the Business Process of an Application System Based on Windows Workflow Foundation., , and . CONFENIS (1), volume 254 of IFIP, page 609-615. Springer, (2007)Improved detection for copy-move forgery with multi-scale sliding windows., , , and . ISPACS, page 231-236. IEEE, (2017)Poster: Fuzz Testing of Quantum Program., , and . ICST, page 466-469. IEEE, (2021)Many-objective optimization based path planning of multiple UAVs in oilfield inspection., , , , and . Appl. Intell., 52 (11): 12668-12683 (2022)Numerical simulations of magnetic resonance elastography using finite element analysis with a linear heterogeneous viscoelastic model., , , , , , , and . J. Vis., 21 (1): 133-145 (2018)Exploring a New Model of Practice-Oriented Education Based on the Cultivation of Outstanding Engineering Talents., , and . ICEED, page 117-121. IEEE, (2023)Wireless Sensor Network Time Synchronization Algorithm Based on SFD., , , , and . CWSN, volume 334 of Communications in Computer and Information Science, page 393-400. Springer, (2012)CSI Measurement and Reciprocity Evaluation Method Based on Embedded Platform., , and . VTC Fall, page 1-6. IEEE, (2021)Phoenix: Detect and Locate Resilience Issues in Blockchain via Context-Sensitive Chaos., , , , , , , and . CCS, page 1182-1196. ACM, (2023)LoRa Network Security Schemes Based on RF Fingerprint., , and . ICAIS (2), volume 12737 of Lecture Notes in Computer Science, page 453-465. Springer, (2021)