Author of the publication

Modeling and Verifying Transaction Scheduling for Software Transactional Memory using CSP.

, , , and . TASE, page 240-247. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demo: Finger and Hand Gesture Recognition using Smartwatch., , , and . MobiSys, page 471. ACM, (2015)Indexing billions of images for sketch-based retrieval., , , and . ACM Multimedia, page 233-242. ACM, (2013)Linear Cryptanalysis of FASER128/256 and TriviA-ck., , and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 237-254. Springer, (2014)Privacy Protection Workflow Publishing Under Differential Privacy., , , , and . WISA, volume 11817 of Lecture Notes in Computer Science, page 382-394. Springer, (2019)Downside Hemisphere Object Detection and Localization of MAV by Fisheye Camera., , , and . ICARCV, page 532-537. IEEE, (2018)Compressive Channel Estimation in Space Domain for Massive MIMO Systems., and . VTC Fall, page 1-5. IEEE, (2015)Fast and Efficient Basis Selection Methods for Embedded Wavelet Packet Image Coding., and . ICIAR (1), volume 4141 of Lecture Notes in Computer Science, page 480-492. Springer, (2006)Saliency oriented object image re-ranking., , and . ICECS, page 371-374. IEEE, (2014)Bolt loosening detection in a jointed beam using empirical mode decomposition-based nonlinear system identification method., , and . IJDSN, (2019)A Nonconforming Characteristic Finite Element Method for Nonlinear Advection-Dominated Diffusion Equation with Memory Term., , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 179-187. Springer, (2013)