Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

List Data Extraction in Semi-structured Document., , and . WISE, volume 3806 of Lecture Notes in Computer Science, page 584-585. Springer, (2005)Dependency of current collapse on the device structure of GaN-based HEMTs., , , , , , , , , and . ASICON, page 1-4. IEEE, (2015)GIANT: Globally Improved Approximate Newton Method for Distributed Optimization., , , and . CoRR, (2017)SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS., and . IACR Cryptology ePrint Archive, (2011)Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack., and . IACR Cryptology ePrint Archive, (2010)Gradient Based Interpolation for Intra Angular Prediction in HEVC., , , and . ISCAS, page 1-5. IEEE, (2018)An Exact Upper Bound on the Lp Lebesgue Constant and The ∞-Rényi Entropy Power Inequality for Integer Valued Random Variables., , and . CoRR, (2018)WebCDN: A Peer-to-Peer Web Browser CDN Based WebRTC., , , and . APSCC, volume 9464 of Lecture Notes in Computer Science, page 235-243. Springer, (2015)Accelerated Stochastic Power Iteration., , , , and . AISTATS, volume 84 of Proceedings of Machine Learning Research, page 58-67. PMLR, (2018)An efficient energy aware virtual network migration based on genetic algorithm., , , and . Frontiers Comput. Sci., 13 (2): 440-442 (2019)