Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guided Interpolation for Adversarial Training., , , , , , and . CoRR, (2021)Adaptive matrix column sampling and completion for rendering participating media., , , , and . ACM Trans. Graph., 35 (6): 167:1-167:11 (2016)Update Migration: An Efficient B+ Tree for Flash Storage., , , , and . DASFAA (2), volume 5982 of Lecture Notes in Computer Science, page 276-290. Springer, (2010)A logical replication-based intrusion detection approach for CSCW system., , , and . CSCWD (2), page 841-845. IEEE Computer Society, (2005)1-84600-002-5.Query Triggered Crawling Strategy: Build a Time Sensitive Vertical Search Engine., , , and . CW, page 422-427. IEEE Computer Society, (2008)Towards Efficient Concurrent Scans on Flash Disks., , , , , and . DEXA (1), volume 6261 of Lecture Notes in Computer Science, page 198-212. Springer, (2010)Bulk Data Dissemination in Low Power Sensor Networks: Present and Future Directions., , and . Sensors, 17 (1): 156 (2017)Watermarking Abstract Tree-Structured Data., , , and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 221-232. Springer, (2005)Multi-Source Multi-Label Learning for User Profiling in Online Games., , , , , , , , and . IEEE Trans. Multim., (2023)Modeling Image Data for Effective Indexing and Retrieval in Large General Image Databases., , , , and . IEEE Trans. Knowl. Data Eng., 20 (11): 1566-1580 (2008)