Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lossy source coding of multiple Gaussian sources: m-helper problem., , , and . ITW, page 34-38. IEEE, (2004)Energy efficient wireless scheduling: adaptive loading in time., and . WCNC, page 706-711. IEEE, (2002)Context-aware sensor data dissemination for mobile users in remote areas., , and . INFOCOM, page 2711-2715. IEEE, (2012)DEEP Reinforcement Learning Based Energy Beamforming for Powering Sensor Networks., , , and . MLSP, page 1-6. IEEE, (2019)Time Awareness in Deep Learning-Based Multimodal Fusion Across Smartphone Platforms., , , and . IoTDI, page 149-156. IEEE, (2020)Knowledge-based transformation ordering., and . ICASSP, page 3334-3337. IEEE Computer Society, (1996)Portkey: Adaptive Key-Value Placement over Dynamic Edge Networks., , and . SoCC, page 197-213. ACM, (2021)How Can I Explain This to You? An Empirical Study of Deep Neural Network Explanation Methods., , , , and . NeurIPS, (2020)ViRUS: Virtual Function Replacement Under Stress., and . HotPower, USENIX Association, (2014)Towards analyzing and improving robustness of software applications to intermittent and permanent faults in hardware., , , , , and . ICCD, page 435-438. IEEE Computer Society, (2013)