Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and correctness proof of a security protocol for mobile banking., , , and . Bell Labs Tech. J., 14 (1): 259-265 (2009)QED post-silicon validation and debug: Invited abstract., and . ISIC, page 62. IEEE, (2014)RingMesh., , and . IEEE Veh. Technol. Mag., 3 (4): 48-55 (2008)Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles., , , and . DAC, page 53:1-53:6. ACM, (2015)Knowledge--based analysis of microarray gene expression data by using support vector machines, , , , , , , and . Proceedings of the National Academy of Sciences, 97 (1): 262--267 (2000)Feature-Weighted Linear Stacking, , , and . CoRR, (2009)Brief announcement: improved asynchronous group mutual exclusion in token-passing networks., , and . PODC, page 275. ACM, (2005)A Visibility-Based Pursuit-Evasion Problem., , , , and . Int. J. Comput. Geom. Appl., 9 (4/5): 471-494 (1999)A Sleep State Detection and Intervention System., , and . HCI (49), volume 1294 of Communications in Computer and Information Science, page 486-492. Springer, (2020)Computational Biomarker Pipeline from Discovery to Clinical Implementation: Plasma Proteomic Biomarkers for Cardiac Transplantation., , , , , , , , , and 7 other author(s). PLoS Comput. Biol., (2013)