Crea il mio profilo
Accesso pubblico
Visualizza tutto86 articoli
86 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Bangbang RenNational University of Defense TechnologyEmail verificata su cs.uni-goettingen.de
- Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleEmail verificata su temple.edu
- Junjie XieNational university of defense technologyEmail verificata su ucsc.edu
- Xiaolei ZhouNational University of Defense TechnologyEmail verificata su nudt.edu.cn
- Yunhao LiuACM Fellow, IEEE Fellow, CCF Fellow, Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Yulong ShenXidan UniversityEmail verificata su mail.xidian.edu.cn
- Xiaoqiang TengNational University of Defense TechnologyEmail verificata su nudt.edu.cn
- Xiang ZhaoProfessor, National University of Defense Technology, ChinaEmail verificata su nudt.edu.cn
- Keqiu LiTianjin UniversityEmail verificata su tju.edu.cn
- Ting QuPhD student, National University of Defense TechnologyEmail verificata su nudt.edu.cn
- Ori RottenstreichTechnionEmail verificata su cs.technion.ac.il
- Kui WuProfessor of Computer Science, University of VictoriaEmail verificata su uvic.ca
- Wenxin Li, Associate ProfessorTianjin UniversityEmail verificata su tju.edu.cn
- Xu LinPhD student of NUDTEmail verificata su nudt.edu.cn
- Richard T. B. MaNational University of SingaporeEmail verificata su comp.nus.edu.sg
- Chen QianProfessor, University of California Santa CruzEmail verificata su ucsc.edu
- yueyue chenNational University of Denfense TechnologyEmail verificata su nudt.edu.cn
- Yuan HeTsinghua UniversityEmail verificata su greenorbs.com
- Panlong YangProfessor at Nanjing University of Information Science and TechnologyEmail verificata su ustc.edu.cn
- Guihai ChenProfessor of Computer ScienceEmail verificata su nju.edu.cn