Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An iSCSI Design and Implementation., , , and . MSST, page 207-213. IEEE, (2004)Adaptive fuzzy control of MIMO non-linear system with dead zone compensation., and . FSKD, page 28-33. IEEE, (2012)An Approach to Intra-Pulse Modulation Recognition Based on the Ambiguity Function., , , and . CSSP, 29 (6): 1103-1122 (2010)The Architectural Design of FRUIT: A Family of Retargetable User Interface Tools., , and . Software Engineering Research and Practice, page 641-647. CSREA Press, (2004)Multi-Stage Residual Fusion Network for LIDAR-Camera Road Detection., , , , and . IV, page 2323-2328. IEEE, (2019)Modeling Individuals' Largest Daily Trip Displacement using Extreme Value Theory., , , and . ITSC, page 2665-2668. IEEE, (2019)Leverage of Limb Detection in Pose Estimation for Vulnerable Road Users., , , , , , and . ITSC, page 528-534. IEEE, (2019)DGEPN-GCEN2V: a new framework for mining GGI and its application in biomarker detection., , , , , , and . Sci. China Inf. Sci., 62 (9): 199104:1-199104:3 (2019)E-BERT: A Phrase and Product Knowledge Enhanced Language Model for E-commerce., , , , , , , and . CoRR, (2020)Preserving privacy in gps traces via uncertainty-aware path cloaking., , , and . ACM Conference on Computer and Communications Security, page 161-171. ACM, (2007)