Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An independent component analysis based tool for exploring functional connections in the brain., , , , , , , , and . Medical Imaging: Image Processing, volume 7259 of SPIE Proceedings, page 725921. SPIE, (2009)A constraint-based placement refinement method for CMOS analog cell layout., , , , and . ISCAS (6), page 408-411. IEEE, (1999)High-throughput genotyping by whole-genome resequencing, , , , , , , , , and 3 other author(s). Genome Res, 19 (6): 1068-1076 (June 2009)Deep Learning Approach to Forecasting COVID-19 Cases in Residential Buildings of Hong Kong Public Housing Estates: The Role of Environment and Sociodemographics., , , , , , , , , and 1 other author(s). CoRR, (2024)A similarity retrieval method for functional magnetic resonance imaging (fMRI) statistical maps., , , , , , , , , and . Medical Imaging: Image Processing, volume 7259 of SPIE Proceedings, page 72590E. SPIE, (2009)Advancing Pulmonary Nodule Classification: A Novel Multi-Scale Fusion and Joint Upsampling Strategy using 3D Convolutional Neural Networks., and . ADMIT, page 148-153. ACM, (2023)Preemptive Ensemble Motion Planning on a Tree., and . SIAM J. Comput., 21 (6): 1130-1152 (1992)Delegated multisignature scheme with document decomposition., , and . J. Syst. Softw., 55 (3): 321-328 (2001)Data Mining for Motifs in DNA Sequences., and . RSFDGrC, volume 2639 of Lecture Notes in Computer Science, page 507-514. Springer, (2003)Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol., , and . IACR Cryptology ePrint Archive, (2005)