Get my own profile
Public access
View all6 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Lotfi A. ZadehProfessor Emeritus, EECS, UC BerkeleyVerified email at eecs.berkeley.edu
- Bo Yuan (袁波)Professor in Computing Security, Rochester Institute of TechnologyVerified email at rit.edu
- salvatore sessaprofessore di informaticaVerified email at unina.it
- Ronald R YagerProfessor Iona CollegeVerified email at panix.com
- Takanori Shibatanational institute of advanced industrial science and technologyVerified email at aist.go.jp
- Henri PradeCNRS, France and University of New South WalesVerified email at TheMagicLab.org
- Charles ElkanProfessor of Computer Science, University of California, San DiegoVerified email at ucsd.edu
- Francis Jeffry PelletierUniversity of AlbertaVerified email at ualberta.ca
- Didier Duboischercheur au CNRSVerified email at irit.fr
- Witold PedryczVerified email at ualberta.ca
- HANG Chang ChiehProfessor, Division of Engg & Tech Mgmt, Faculty of Engineering, National University of SingaporeVerified email at nus.edu.sg
- Yong ShiProfessor, University of Chinese Academy of SciencesVerified email at ucas.ac.cn
- Jing HeUniversity of OxfordVerified email at ndcn.ox.ac.uk
- Joo Hwee LimHead, Visual Intelligence Dept, I2R, A*STARVerified email at i2r.a-star.edu.sg
- Ping LiangRF DSP Inc. & Cellular Nanomed Inc.Verified email at rfdsp.com
- Haibin ZhangUniversity of Toronto; ESI; IMRA;Verified email at esi.com
- Anyi LiResearch Associate, University of WashingtonVerified email at uw.edu
Follow
Peizhuang Wang (汪培庄)
Professor, Liaoning Technical University
Verified email at mails.ucas.edu.cn