Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking and Defending Covert Channels and Behavioral Models, , and . CoRR, (2011)Computation of the Lovász Theta Function for Circulant Graphs, , , , and . Electron. Colloquium Comput. Complex., (2003)Fast Graph Learning with Unique Optimal Solutions., , , and . CoRR, (2021)Predicting Progression from Mild Cognitive Impairment to Alzheimer's Disease using MRI-based Cortical Features and a Two-State Markov Model., , , , , , , and . ISBI, page 1145-1149. IEEE, (2021)Learning Hidden Markov Models Using Nonnegative Matrix Factorization., and . IEEE Trans. Inf. Theory, 57 (6): 3963-3970 (2011)The theory of trackability with applications to sensor networks., , and . ACM Trans. Sens. Networks, 4 (3): 16:1-16:42 (2008)Engineering Statistical Behaviors for Attacking and Defending Covert Channels., , and . J. Sel. Topics Signal Processing, 7 (1): 124-136 (2013)Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs., , , and . CoRR, (2021)Implicit SVD for Graph Representation Learning., , , , , and . NeurIPS, page 8419-8431. (2021)Top-down vs bottom-up methodologies in multi-agent system design, , and . Autonomous Robots, 24 (3): 303--313 (April 2008)