default search action
Wenchao Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Han Feng, Wenchao Ma, Quankai Gao, Xianwei Zheng, Nan Xue, Huijuan Xu:
Stratified Avatar Generation from Sparse Observations. CVPR 2024: 153-163 - [i5]Xiaoming Zhai, Matthew Nyaaba, Wenchao Ma:
Can generative AI and ChatGPT outperform humans on cognitive-demanding problem-solving tasks in science? CoRR abs/2401.15081 (2024) - [i4]Quankai Gao, Qiangeng Xu, Zhe Cao, Ben Mildenhall, Wenchao Ma, Le Chen, Danhang Tang, Ulrich Neumann:
GaussianFlow: Splatting Gaussian Dynamics for 4D Content Creation. CoRR abs/2403.12365 (2024) - [i3]Han Feng, Wenchao Ma, Quankai Gao, Xianwei Zheng, Nan Xue, Huijuan Xu:
Stratified Avatar Generation from Sparse Observations. CoRR abs/2405.20786 (2024) - 2022
- [j17]Jiahui Li, Xiaogang Qi, Wenchao Ma, Lifang Liu:
Path selection for link failure protection in hybrid SDNs. Future Gener. Comput. Syst. 137: 201-215 (2022) - [j16]Jiaqi Yu, Wenchao Ma, Jewoong Moon, André R. Denham:
Developing a Stealth Assessment System Using a Continuous Conjunctive Model. J. Learn. Anal. 9(3): 11-31 (2022) - [c15]Wenchao Ma, Bin Tan, Nan Xue, Tianfu Wu, Xianwei Zheng, Gui-Song Xia:
HoW-3D: Holistic 3D Wireframe Perception from a Single Image. 3DV 2022: 596-605 - [c14]Hui Wang, Xiaoku Zhang, Xiaoying Nong, Chao Sun, Zehai Gao, Wenchao Ma:
Spatial-temporal Characteristics and Source Identification of Water Pollutants in Xi'an Moat. IEEA 2022: 65-71 - [i2]Chris Munley, Wenchao Ma, Johannes E. Fröch, Quentin A. A. Tanguy, Elyas Bayati, Karl F. Böhringer, Zin Lin, Raphaël Pestourie, Steven G. Johnson, Arka Majumdar:
Inverse-Designed Meta-Optics with Spectral-Spatial Engineered Response to Mimic Color Perception. CoRR abs/2204.13520 (2022) - [i1]Wenchao Ma, Bin Tan, Nan Xue, Tianfu Wu, Xianwei Zheng, Gui-Song Xia:
HoW-3D: Holistic 3D Wireframe Perception from a Single Image. CoRR abs/2208.06999 (2022) - 2021
- [j15]Natsumi Kitajima, Rie Seto, Dai Yamazaki, Xudong Zhou, Wenchao Ma, Shinjiro Kanae:
Potential of a SAR Small-Satellite Constellation for Rapid Monitoring of Flood Extent. Remote. Sens. 13(10): 1959 (2021) - 2020
- [c13]Junfeng Hu, Jun Liao, Li Liu, Wenchao Ma:
RCapsNet: A Recurrent Capsule Network for Text Classification. IJCNN 2020: 1-8
2010 – 2019
- 2019
- [c12]Wenchao Ma, Junfeng Hu, Jun Liao, Zhencheng Fan, Jianjun Wu, Li Liu:
Finger Gesture Recognition Based on 3D-Accelerometer and 3D-Gyroscope. KSEM (1) 2019: 406-413 - 2018
- [j14]Chunyu Huang, Wenchao Ma, Dong Wang, Liu Ye:
How the Hawking radiation affect quantum Fisher information of Dirac particles in the background of a Schwarzschild black hole. Quantum Inf. Process. 17(1): 16 (2018) - [c11]Junfeng Hu, Wenchao Ma, Aamir Khan, Li Liu:
Recognizing Character-Matching CAPTCHA Using Convolutional Neural Networks with Triple Loss. KSEM (2) 2018: 209-220 - 2016
- [j13]Chunyu Huang, Wenchao Ma, Liu Ye:
Protecting quantum entanglement and correlation by local filtering operations. Quantum Inf. Process. 15(8): 3243-3256 (2016) - 2015
- [j12]Jia-Dong Shi, Shuai Xu, Wenchao Ma, Xue-ke Song, Liu Ye:
Purifying two-qubit entanglement in nonidentical decoherence by employing weak measurements. Quantum Inf. Process. 14(4): 1387-1397 (2015) - [j11]Wenchao Ma, Shuai Xu, Juan He, Jia-Dong Shi, Liu Ye:
Probing the entanglement distillability responses to the Unruh effect and prepared states. Quantum Inf. Process. 14(4): 1411-1428 (2015) - [j10]Jia-Dong Shi, Dong Wang, Wenchao Ma, Liu Ye:
Enhancing quantum correlation in open-system dynamics by reliable quantum operations. Quantum Inf. Process. 14(9): 3569-3579 (2015) - [j9]Ren-jie Zhang, Shuai Xu, Jia-Dong Shi, Wenchao Ma, Liu Ye:
Exploration of quantum phases transition in the XXZ model with Dzyaloshinskii-Moriya interaction using trance distance discord. Quantum Inf. Process. 14(11): 4077-4088 (2015) - 2010
- [j8]Quan Zheng, Peng Zhao, Li Zhang, Wenchao Ma:
Variants of Steffensen-secant method and applications. Appl. Math. Comput. 216(12): 3486-3496 (2010)
2000 – 2009
- 2008
- [j7]Xin Guo, Wenchao Ma, Zihua Guo, Xuemin (Sherman) Shen, Zifeng Hou:
Adaptive Resource Reuse Scheduling for Multihop Relay Wireless Network Based on Multicoloring. IEEE Commun. Lett. 12(3): 176-178 (2008) - 2007
- [j6]Weiwei Wang, Changjia Chen, Yunbao Zeng, Zihua Guo, Wenchao Ma, Xuemin Shen:
Unified Radio Network for Broadcasting and Broadband Wireless Access [Advances in Mobile Multimedia]. IEEE Commun. Mag. 45(8): 54-61 (2007) - [j5]Wenchao Ma, Yuguang Fang, Phone Lin:
Mobility Management Strategy Based on User Mobility Patterns in Wireless Networks. IEEE Trans. Veh. Technol. 56(1): 322-330 (2007) - [j4]Min Cao, Wenchao Ma, Qian Zhang, Xiaodong Wang:
Analysis of IEEE 802.16 Mesh Mode Scheduler Performance. IEEE Trans. Wirel. Commun. 6(4): 1455-1464 (2007) - [c10]Lihua Wan, Wenchao Ma, Zihua Guo:
A Cross-layer Packet Scheduling and Subchannel Allocation Scheme in 802.16e OFDMA System. WCNC 2007: 1865-1870 - [c9]Xiaoyu Fu, Wenchao Ma, Qian Zhang:
The IEEE 802.16 and 802.11a Coexistence in the License-Exempt Band. WCNC 2007: 1942-1947 - [c8]Xin Guo, Wenchao Ma, Zihua Guo, Zifeng Hou:
Dynamic Bandwidth Reservation Admission Control Scheme for the IEEE 802.16e Broadband Wireless Access Systems. WCNC 2007: 3418-3423 - [c7]Wenchao Ma:
Paging Group Layout with Overlapped Edge for IEEE 802.16e Wireless Networks. WCNC 2007: 3658-3663 - 2006
- [c6]Wenchao Ma, Rihui Tian:
One flexible end system-based self-coordinating approach for internet conferencing. IMSA 2006: 47-52 - 2005
- [j3]Wenchao Ma, Yuguang Fang:
A pointer forwarding based local anchoring (POFLA) scheme for wireless networks. IEEE Trans. Veh. Technol. 54(3): 1135-1146 (2005) - [c5]Min Cao, Wenchao Ma, Qian Zhang, Xiaodong Wang, Wenwu Zhu:
Modelling and performance analysis of the distributed scheduler in IEEE 802.16 mesh mode. MobiHoc 2005: 78-89 - 2004
- [j2]Wenchao Ma, Yuguang Fang:
Dynamic hierarchical mobility management strategy for mobile IP networks. IEEE J. Sel. Areas Commun. 22(4): 664-676 (2004) - 2003
- [c4]Wenchao Ma, Yuguang Fang:
A user mobility-pattern-based location strategy for next generation wireless multimedia networks. GLOBECOM 2003: 3098-3102 - [c3]Wenchao Ma, Yuguang Fang:
Improved distributed regional location management scheme for mobile IP. PIMRC 2003: 2505-2509 - 2002
- [j1]Wenchao Ma, Yuguang Fang:
Two-Level Pointer Forwarding Strategy for Location Management in PCS Networks. IEEE Trans. Mob. Comput. 1(1): 32-45 (2002) - [c2]Wenchao Ma, Yuguang Fang:
Location management employing two-level forwarding pointers in PCS networks. GLOBECOM 2002: 1653-1657 - [c1]Wenchao Ma, Yuguang Fang:
A New Location Management Strategy Based on User Mobility Pattern for Wireless Networks. LCN 2002: 451-457
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint