Author of the publication

Low Rank Approximation of Binary Matrices: Column Subset Selection and Generalizations.

, , , , and . MFCS, volume 117 of LIPIcs, page 41:1-41:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information-Centric Wireless Networks with Mobile Edge Computing., , , and . CoRR, (2017)Robust Energy-Efficient Resource Allocation for IoT-Powered Cyber-Physical-Social Smart Systems With Virtualization., , , and . IEEE Internet of Things Journal, 6 (2): 2413-2426 (2019)Data and Decision Intelligence for Human-in-the-Loop Cyber-Physical Systems: Reference Model, Recent Progresses and Challenges., , , , , , and . J. Signal Process. Syst., 90 (8-9): 1167-1178 (2018)Adaptive Data Transmission and Computing for Vehicles in the Internet-of-Intelligence., , , and . IEEE Trans. Veh. Technol., 73 (2): 2533-2548 (2024)Stochastic Workload Scheduling for Uncoordinated Datacenter Clouds with Multiple QoS Constraints., , , , , , and . IEEE Trans. Cloud Comput., 8 (4): 1284-1295 (2020)Driver attention prediction based on convolution and transformers., , and . J. Supercomput., 78 (6): 8268-8284 (2022)PIT: Progressive Interaction Transformer for Pedestrian Crossing Intention Prediction., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (12): 14213-14225 (December 2023)Error variance-constrained ∞ filtering for a class of nonlinear stochastic systems with degraded measurements: the finite horizon case., , , and . Int. J. Systems Science, 43 (12): 2361-2372 (2012)On the MEC Service Reliability of Two-Tier HetNets: A Stochastic Perspective., , , , , and . ICCT, page 840-845. IEEE, (2023)SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities., and . USENIX Security Symposium, page 495-510. USENIX Association, (2014)