Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing the Difference in Measuring Bolt Stress: A Comparison of Two Optical Fiber Sensing Techniques., , , , , and . J. Sensors, (2018)k-d Tree Construction Designed for Motion Blur., , , , , and . EGSR (EI&I), page 113-119. Eurographics Association, (2017)EDAS Method for Extended Hesitant Fuzzy Linguistic Multi-criteria Decision Making., , and . Int. J. Fuzzy Syst., 20 (8): 2470-2483 (2018)Kinematic Self-Calibration Method for Dual-Manipulators Based on Optical Axis Constraint., , , , and . IEEE Access, (2019)Skeptical Deep Learning with Distribution Correction., , , , , , and . CoRR, (2018)A Hybrid Resource Scheduling Strategy in Speculative Execution Based on Non-cooperative Game Theory., , and . ICCCS (1), volume 11063 of Lecture Notes in Computer Science, page 86-96. Springer, (2018)Dual-collaborative DoS/DDoS mitigation approach in information-centric mobile Internet., , and . Int. J. Commun. Syst., (2020)Using computational ethnography to enhance the curation of real-world data (RWD) for chronic pain and invisible disability use cases., , and . ACM SIGACCESS Access. Comput., (2020)Monitoring Acute Stroke in Mouse Model Using Laser Speckle Imaging-Guided Visible-Light Optical Coherence Tomography., , , , , and . IEEE Trans. Biomed. Eng., 65 (10): 2136-2142 (2018)Linkboost: A Link Prediction Algorithm to Solve the Problem of Network Vulnerability in Cases Involving Incomplete Information., , , , and . Complex., (2020)