From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hesitant fuzzy programming technique for multidimensional analysis of hesitant fuzzy preferences., , и . OR Spectrum, 38 (3): 789-817 (2016)Multi-resource Fair Allocation with Bounded Number of Tasks in Cloud Computing Systems., , , и . NCTCS, том 768 из Communications in Computer and Information Science, стр. 3-17. Springer, (2017)IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers., , , и . Digit. Investig., (2020)NA Operator-Based Interval-Valued q-Rung Orthopair Fuzzy PSI-COPRAS Group Decision-Making Method., , и . Int. J. Fuzzy Syst., 25 (1): 198-221 (февраля 2023)Rethinking Memory and Communication Cost for Efficient Large Language Model Training., , , , , , , , , и 1 other автор(ы). CoRR, (2023)What's the Story in EBS Glory: Evolutions and Lessons in Building Cloud Block Store., , , , , , , , , и 17 other автор(ы). FAST, стр. 277-291. USENIX Association, (2024)BCAD: An Interpretable Anomaly Transaction Detection System Based on Behavior Consistency., , , , , и . ECML/PKDD (6), том 14174 из Lecture Notes in Computer Science, стр. 259-274. Springer, (2023)An Industrial Framework for Cold-Start Recommendation in Zero-Shot Scenarios., , , , , , , , , и . SIGIR, стр. 3403-3407. ACM, (2022)QEBA: Query-Efficient Boundary-Based Blackbox Attack., , , , и . CVPR, стр. 1218-1227. Computer Vision Foundation / IEEE, (2020)BadDet: Backdoor Attacks on Object Detection., , , , и . ECCV Workshops (1), том 13801 из Lecture Notes in Computer Science, стр. 396-412. Springer, (2022)