Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deceptive Detection and Security Reinforcement in Grid Computing., , and . INCoS, page 146-152. IEEE, (2013)Designing of a Mobile Collaboration Application for Student Collaborative Group Work: Evidence from China., and . HICSS, page 544-551. IEEE Computer Society, (2015)Some Results on Zinbiel Algebras and Rota-Baxter Operators., , and . Axioms, 13 (5): 314 (May 2024)A novel core-shell microcapsule for encapsulation and 3D culture of embryonic stem cells, , , , , , , , , and 3 other author(s). J. Mater. Chem. B, (2013)Improvement and applications of secure outsourcing of scientific computations., , and . J. Ambient Intell. Humaniz. Comput., 6 (6): 763-772 (2015)Identification of Causal Structure in the Presence of Missing Data with Additive Noise Model., , , , and . AAAI, page 20516-20523. AAAI Press, (2024)Spatial-Temporal Analysis of Vehicle Routing Problem from Online Car-Hailing Trajectories., , , , , and . ISPRS Int. J. Geo Inf., 12 (8): 319 (August 2023)When Avatars Matter: Leveraging Avatar-mediated Interactions to Enable Creative Performance in Videoconferencing., , and . AMCIS, Association for Information Systems, (2024)Crosscorrelogram migration of inverse vertical seismic profile data, and . Geophysics, 71 (1): S1--11 (Jan 1, 2006)Distributed MPC of Vehicle Platoons Considering Longitudinal and Lateral Coupling., , , , , , and . IEEE Trans. Intell. Transp. Syst., 25 (3): 2293-2310 (March 2024)