Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
14 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Deke Guo, Professor, IEEE Senior Me...National University of Defense TechnologyEmail verificata su nudt.edu.cn
- Xu LinPhD student of NUDTEmail verificata su nudt.edu.cn
- Junjie XieNational university of defense technologyEmail verificata su ucsc.edu
- Yulong ShenXidan UniversityEmail verificata su mail.xidian.edu.cn
- Xiaoming FuProfessor of Computer Science, University of GoettingenEmail verificata su cs.uni-goettingen.de
- Weijun (Alex) Wang (王蔚峻)Tsinghua UniversityEmail verificata su air.tsinghua.edu.cn
- Yali YuanUniversity of GöttingenEmail verificata su informatik.uni-goettingen.de
- Richard T. B. MaNational University of SingaporeEmail verificata su comp.nus.edu.sg
- Ori RottenstreichTechnionEmail verificata su cs.technion.ac.il
- Xiaoqiang TengNational University of Defense TechnologyEmail verificata su nudt.edu.cn
- yueyue chenNational University of Denfense TechnologyEmail verificata su nudt.edu.cn
- Tongqing ZhouPHD of computer science and technology, National University of Defense TechnolotyEmail verificata su nudt.edu.cn
- Chen QianProfessor, University of California Santa CruzEmail verificata su ucsc.edu
- Xiaomin ZhuNational University of Defense TechnologyEmail verificata su nudt.edu.cn
- Wenxin Li, Associate ProfessorTianjin UniversityEmail verificata su tju.edu.cn
- Jie WuLaura H. Carnell Professor, Department of Computer and Information Sciences, TempleEmail verificata su temple.edu
- Haipeng DaiNanjing UniversityEmail verificata su smail.nju.edu.cn