Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimization of frequent itemset mining on multiple-core processor, , , and . VLDB '07: Proceedings of the 33rd international conference on Very large data bases, page 1275--1285. VLDB Endowment, (2007)A nonstationary Poisson point process describes the sequence of action potentials over long time scales in lateral-superior-olive auditory neurons., , , , , and . Biol. Cybern., 70 (3): 209-217 (1994)AGenT Zero: Zero-shot Automatic Multiple-Choice Question Generation for Skill Assessments., , , and . CoRR, (2020)Investigating Genetic Signatures for Sex-Biased miRNA targeted Genes related to Intellectual Disability., , , and . BIBM, page 1395-1402. IEEE, (2020)Parallel implementation and performance characterization of MUSCLE., , , and . IPDPS, IEEE, (2006)A novel marine predators algorithm with adaptive update strategy., , , , , and . J. Supercomput., 79 (6): 6612-6645 (April 2023)Additive manufacturing-driven simultaneous optimization of topology and print direction for thermoelastic structures considering strength failure., , , and . J. Comput. Des. Eng., 11 (3): 185-199 (2024)The Impact of Online Store Characteristics on Service Recovery Satisfaction in C2C Online Markets., , and . WHICEB, page 93. Association for Information Systems, (2014)From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation., , , and . GraMSec@CSF, volume 9987 of Lecture Notes in Computer Science, page 102-118. Springer, (2016)SURF cascade face detection acceleration on Sandy Bridge processor., , , , and . CVPR Workshops, page 41-47. IEEE Computer Society, (2012)