From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications.. IACR Cryptology ePrint Archive, (2005)Exploiting quality-energy tradeoffs with arbitrary quantization: special session paper., , , , и . CODES+ISSS, стр. 30:1-30:2. ACM, (2017)Approximate Computing: Making Mobile Systems More Efficient., , и . IEEE Pervasive Comput., 14 (2): 9-13 (2015)PANEL: Open panel and discussion on tackling complexity, reproducibility and tech transfer challenges in a rapidly evolving AI/ML/systems research., , , , , и . ReQuEST@ASPLOS, стр. 7. ACM, (2018)A model-based statistic for detecting molecular markers associated with complex survival patterns in early-stage cancer., и . J. Clin. Bioinform., (2012)SNNAP: Approximate computing on programmable SoCs via neural acceleration., , , , , , и . HPCA, стр. 603-614. IEEE Computer Society, (2015)A probabilistic flaw in PGP design?. Comput. Secur., 15 (1): 39-43 (1996)Linear rank tests for comparing survival in two groups with crossing hazards, , , и . Computational Statistics & Data Analysis, 18 (5): 547--559 (декабря 1994)A simple procedure for estimating the false discovery rate., , и . Bioinform., 21 (5): 660-668 (2005)Learning to Optimize Tensor Programs., , , , , , , и . NeurIPS, стр. 3393-3404. (2018)