Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Transcriptomic Landscapes of SARS-CoV-2 Variants in Multiple Organs from Infected Rhesus Macaques., , , , , , , , , and 6 other author(s). Genom. Proteom. Bioinform., 21 (5): 1014-1029 (2023)E-Business Process Modelling with Finite State Machine Based Service Agents., and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 261-272. Springer, (2007)Agent-Based Approach for Dynamic Ontology Management., , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1-7. Springer, (2005)A Bayesian approach to sequential monitoring of nonlinear profiles using wavelets., , , and . Qual. Reliab. Eng. Int., 35 (3): 761-775 (2019)Ensemble of Receptive Fields for Training Central-Focused Convolutional Neural Networks., , and . INDIN, page 1381-1386. IEEE, (2019)Efficient Large Scale Integration Power/Ground Network Optimization Based on Grid Genetic Algorithm., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (12): 3412-3420 (2005)Discovering Regularities from Traditional Chinese Medicine Prescriptions via Bipartite Embedding Model., , , , and . IJCAI, page 3346-3352. ijcai.org, (2019)Impartial Spectrum Decision under Interference Temperature Model in Cognitive Wireless Mesh Networks., , and . INCoS, page 566-570. IEEE, (2012)Efficient and robust time series prediction model based on REMD-MMLP with temporal-window., and . Expert Syst. Appl., (2022)Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor., , , , , , , , and . IEEE Trans. Computers, 69 (11): 1571-1583 (2020)