Author of the publication

Gradient-based Hierarchical Clustering using Continuous Representations of Trees in Hyperbolic Space.

, , , , and . KDD, page 714-722. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparative Analysis for 2D Object Recognition: A Case Study with Tactode Puzzle-Like Tiles., , and . J. Imaging, 7 (4): 65 (2021)Applying Gamification to Prioritize Requirements in Agile Projects., , , , and . SAC, page 1498-1507. ACM, (2023)Distributed and fault-tolerant execution framework for transaction processing., , , , , , , and . SYSTOR, page 2. ACM, (2011)Topological Symmetry Groups of the Petersen Graphs., , , , and . Symmetry, 15 (6): 1267 (2023)Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality., , , , and . GameSec, volume 13727 of Lecture Notes in Computer Science, page 23-43. Springer, (2022)Temporal analysis on pull request patterns: an approach with sliding window., , and . SBCARS, page 90-99. ACM, (2021)Fostering Multi-stakeholder Collaboration Through Co-production and Rewarding., , , , , , , , and . UCAmI, volume 594 of Lecture Notes in Networks and Systems, page 559-564. Springer, (2022)RFID framework for intelligent traffic monitoring., , , and . EATIS, page 1-6. IEEE, (2016)Parallel programming framework for large batch transaction processing on scale-out systems., , , , , , , and . SYSTOR, ACM, (2010)Emotional State Classification and Related Behaviors Among Cyber Attackers., , , , , , , and . HICSS, page 846-855. ScholarSpace, (2023)