Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Invocation of Web Services Using Intensional Results., and . EC-Web, volume 4082 of Lecture Notes in Computer Science, page 162-172. Springer, (2006)Binary Code Representation With Well-Balanced Instruction Normalization., , , and . IEEE Access, (2023)The Interplay Between Human Likeness and Agency on Virtual Influencer Credibility., and . Cyberpsychology Behav. Soc. Netw., 26 (10): 764-771 (October 2023)A Look Back on a Function Identification Problem., , and . ACSAC, page 158-168. ACM, (2021)Lightweight Logging and Recovery for Distributed Shared Memory over Virtual Interface Architecture., , and . ISPDC, page 199-206. IEEE Computer Society, (2003)User Preferences When Searching Individual and Integrated Full-Text Databases.. ACM DL, page 195-203. ACM, (1999)A framework to predict the quality of answers with non-textual features., , , and . SIGIR, page 228-235. ACM, (2006)A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress)., and . ICSSA, page 30-33. IEEE, (2018)A Deep Learning Based Self-Evolving Oil Spill Detection Algorithm Using Sentinel-1 SAR Images., , , and . IGARSS, page 1289-1292. IEEE, (2023)A Threshold Model for Oil Spill Detection by Estimating NRCS for Ocean Surface from Sentinel-1 Images., , and . IGARSS, page 1281-1284. IEEE, (2023)