Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of an Instrument to Study the Use of Recommendation Systems., , , , and . AMCIS, page 34. Association for Information Systems, (2003)An Exact Upper Bound on the Lp Lebesgue Constant and The ∞-Rényi Entropy Power Inequality for Integer Valued Random Variables., , and . CoRR, (2018)SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS., and . IACR Cryptology ePrint Archive, (2011)Gradient Based Interpolation for Intra Angular Prediction in HEVC., , , and . ISCAS, page 1-5. IEEE, (2018)Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack., and . IACR Cryptology ePrint Archive, (2010)An efficient energy aware virtual network migration based on genetic algorithm., , , and . Frontiers Comput. Sci., 13 (2): 440-442 (2019)WebCDN: A Peer-to-Peer Web Browser CDN Based WebRTC., , , and . APSCC, volume 9464 of Lecture Notes in Computer Science, page 235-243. Springer, (2015)Accelerated Stochastic Power Iteration., , , , and . AISTATS, volume 84 of Proceedings of Machine Learning Research, page 58-67. PMLR, (2018)Data-Intensive Text Processing with MapReduce Jimmy Lin and Chris Dyer (University of Maryland) Morgan & Claypool (Synthesis Lectures on Human Language Technologies, edited by Graeme Hirst, volume 7), 2010, xi+165 pp; paperbound, ISBN 978-1-60845-342-9, $40.00; ebook, ISBN 978-1-60845-343-6, $30.00 or by subscription.. Computational Linguistics, 37 (3): 635-637 (2011)List Data Extraction in Semi-structured Document., , and . WISE, volume 3806 of Lecture Notes in Computer Science, page 584-585. Springer, (2005)