Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intention-Disguised Algorithmic Trading., , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 408-415. Springer, (2010)Designing floating codes for expected performance., , , and . IEEE Trans. Inf. Theory, 56 (3): 968-978 (2010)TF3P: Three-Dimensional Force Fields Fingerprint Learned by Deep Capsular Network., , , , , , , and . J. Chem. Inf. Model., 60 (6): 2754-2765 (2020)Towards Socially Acceptable Food Type Recognition., , , , , , , and . MSN, page 671-678. IEEE, (2022)Molecular Graph Generation with Deep Reinforced Multitask Network and Adversarial Imitation Learning., , , , and . BIBM, page 326-329. IEEE, (2019)Information dissemination via random walks in d-dimensional space., , , , and . SODA, page 1612-1622. SIAM, (2012)Fully Integrated High-Frequency MEMS and CMOS Inertial Measurement Systems: Taking a Journey from Silicon to Silicon Carbide., , , , and . PLANS, page 18-24. IEEE, (2023)Influence Maximization in Social Networks When Negative Opinions May Emerge and Propagate., , , , , , , , , and . SDM, page 379-390. SIAM / Omnipress, (2011)A game-theoretic framework to identify overlapping communities in social networks, , , and . Data Min. Knowl. Discov., 21 (2): 224--240 (2010)Mind Your Own Bandwidth: An Edge Solution to Peak-hour Broadband Congestion., , , , and . CoRR, (2013)