Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error Estimation in the Spatial Discretization of Multiscale Bridging Models., and . Multiscale Modeling & Simulation, 3 (4): 940-956 (2005)Image reconstruction in SPECT with a half detector., , and . Medical Imaging: Image Processing, volume 4684 of SPIE Proceedings, SPIE, (2002)PBI function based evolutionary algorithm with precise penalty parameter for unconstrained many-objective optimization., , and . Swarm Evol. Comput., (2019)Data redundancy and reduced-scan reconstruction in reflectivity tomography., , and . IEEE Trans. Image Processing, 12 (7): 784-795 (2003)A language model approach to capture commercial intent and information relevance for sponsored search., , and . CIKM, page 599-604. ACM, (2011)Force and Velocity Ripple Reduction of the New Linear Motor., , , and . IEEE Access, (2021)Automotive Three-Dimensional Vision Through a Single-Photon Counting SPAD Camera., , , , , and . IEEE Trans. Intell. Transp. Syst., 17 (3): 782-795 (2016)Potential Rockfall Source Identification and Hazard Assessment in High Mountains (Maoyaba Basin) of the Tibetan Plateau., , , , , , , and . Remote. Sens., 15 (13): 3273 (July 2023)Multi-Scale Engineering Geological Zonation for Linear Projects in Mountainous Regions: A Case Study of National Highway 318 Chengdu-Shigatse Section., , , , , , , , , and 1 other author(s). Remote. Sens., 15 (18): 4619 (September 2023)OMT: A Run-time Adaptive Architectural Framework for Bonsai Merkle Tree-Based Secure Authentication with Embedded Heterogeneous Memory., , , and . HOST, page 191-202. IEEE, (2023)