Browsing by Author Hu, L

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 14 of 14
Issue DateTitleAuthor(s)
2014Comparative analysis of the transcriptome across distant speciesGerstein, MB; Rozowsky, J; Yan, K-K; Wang, D; Cheng, C; Brown, JB; Davis, CA; Hillier, L; Sisu, C; Li, JJ; Pei, B; Harmanci, AO; Duff, MO; Djebali, S; Alexander, RP; Alver, BH; Auerbach, R; Bell, K; Bickel, PJ; Boeck, ME; Boley, NP; Booth, BW; Cherbas, L; Cherbas, P; Di, C; Dobins, A; Drenkows, J; Ewing, B; Fang, G; Fastucas, M; Feingold, EA; Frankish, A; Gao, G; Good, PJ; Guigo, R; Hammonds, A; Harrow, J; Hoskins, RA; Howald, C; Hu, L; Huang, H; Hubbard, TJP; Huynh, C; Jhas, S; Kasper, D; Kato, M; Kaufman, TC; Kitchen, RR; Ladewig, E; Lagarde, J; Lai, E; Leng, L; Lu, Z; MacCoss, M; May, G; McWhirter, R; Merrihew, G; Miller, DM; Mortazavi, A; Murad, R; Oliver, B; Olson, S; Park, PJ; Pazin, MJ; Perrimon, N; Pervouchine, D; Reinke, V; Reymond, A; Robinson, G; Samsonova, A; Saunders, GI; Schlesingers, F; Sethi, A; Slack, FJ; Spencer, WC; Stoiber, MH; Strasbourger, P; Tanzer, A; Thompson, OA; Wan, KH; Wang, G; Wang, H; Watkins, KL; Wen, J; Wen, K; Xue, C; Yang, L; Yip, K; Zaleskis, C; Zhang, Y; Zheng, H; Brenner, SE; Graveley, BR; Ceniker, SE; Gingeras, TR; Waterston, R
2016A constrained optimization approach to dynamic state estimation for power systems including PMU and missing measurementsHu, L; Wang, Z; Rahman, I; Liu, X
2017Event-based input and state estimation for linear discrete time-varying systemsHu, L; Wang, Z; Han, QL; Liu, X
2002Evolutionary testing supported by slicing and transformationHarman, M; Hu, L; Hierons, RM; Fox, C; Danicic, S; Wegener, J; Sthamer, H; Baresel, A
30-Jun-2020A haze feature extraction and pollution level identification pre-warning algorithmZhang, Y; Ma, J; Hu, L; Yu, K; Song, L; Chen, H
2004Loop squashing transformations for amorphous slicingHu, L; Harman, M; Hierons, RM; Binkley, D
2010Performance analysis of contention based bandwidth request mechanisms in WiMAX networksNi, Q; Hu, L; Vinel, A; Xiao, Y; Hadjinicolaou, M
2002A post-placement side-effect removal algorithmHarman, M; Hu, L; Hierons, RM; Munro, M; Zhang, X; Dolado, JJ; Otero, MC; Wegener, J
3-Dec-2022A review on COLREGs-compliant navigation of autonomous surface vehicles: From traditional to learning-based approachesHu, L; Hu, H; Naeem, W; Wang, Z
Jan-2019State estimation under false data injection attacks: Security analysis and system protectionHu, L; Wang, Z; Han, QL; Liu, X
26-Nov-2021State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and InsecurityXu, W; Wang, Z; Hu, L; Kurths, J
9-Feb-2021Study on the Mathematical Model and Propagation Characteristics of AE Waveform Signals during Rock FractureYou, X; Gong, B; Lv, X; Hu, L
2004Testability transformationHarman, M; Hu, L; Hierons, RM; Wegener, J; Sthamer, H; Baresel, A; Roper, M
2002VADA: A transformation-based system for variable dependence analysisHarman, M; Fox, C; Hierons, RM; Hu, L; Danicic, S; Wegener, J