Search

Your search keyword '"Liu, Keqin"' showing total 406 results

Search Constraints

Start Over You searched for: Author "Liu, Keqin" Remove constraint Author: "Liu, Keqin"
406 results on '"Liu, Keqin"'

Search Results

1. Efficient Algorithm Design of Dynamic Spectrum Access by Whittle Index

2. On a determinant involving linear combinations of Legendre symbols

5. Temperature Balancing, Layer-wise Weight Analysis, and Neural Network Training

7. PCL-Indexability and Whittle Index for Restless Bandits with General Observation Models

9. fNIRS Monitoring During Carotid Artery Stenting for Outcomes Prediction

11. Generalization and Another Proof of Two Conjectural Identities Posed by Sun

12. Noncommutative Partial Derivative

14. A Data Analysis Study on Human Liver Blood Circulation

16. Low-Complexity Algorithm for Restless Bandits with Imperfect Observations

17. Relaxed Indexability and Index Policy for Partially Observable Restless Bandits

19. Automatic Integration

20. How to Define Automatic Differentiation

25. Type $\theta$ Stokes' Theorem for Chains

26. Calculus on Dual Real Numbers

30. New Characterizations of Algebraic Regularity

32. Numerical simulation of the residual stress of solid oxide fuel cells with a three-dimensional nonplanar cathode–electrolyte interface.

36. Algebraic Regularity over Quaternions and Regular Four-Manifolds

37. Fully Hardware Memristive Neuromorphic Computing Enabled by the Integration of Trainable Dendritic Neurons and High‐Density RRAM Chip.

41. Some Results about Triangular Representations of Lie Algebras

42. “Sudden Drop” in Blood Pressure is Associated With Recanalization After Thrombolysis

43. Lower Serum Calcium Level Is Associated With Hemorrhagic Transformation After Thrombolysis

44. Distributed Flow Scheduling in an Unknown Environment

45. Representations$^{6-th}$ of Lie Algebras

46. Sheaf Structures On a Class of Noncommutative Spectra

47. Adaptive Shortest-Path Routing under Unknown and Stochastically Varying Link States

48. The Extended UCB Policies for Frequentist Multi-armed Bandit Problems

49. Dynamic Intrusion Detection in Resource-Constrained Cyber Networks

50. Deterministic Sequencing of Exploration and Exploitation for Multi-Armed Bandit Problems

Catalog

Books, media, physical & digital resources