Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High Throughput Neural Network for Network Intrusion Detection on FPGAs: An Algorithm-Architecture Interaction., , , and . ICISSP, page 423-429. SCITEPRESS, (2024)Contentions-conscious dynamic but deterministic scheduling of computational and communication tasks., , and . SAC, page 1487-1492. ACM, (2006)Learning Rates for Kernel-Based Expectile Regression., and . CoRR, (2017)An SVM-like approach for expectile regression., and . Comput. Stat. Data Anal., (2017)Mirror Prox Algorithm for Large-Scale Cell-Free Massive MIMO Uplink Power Control., , and . IEEE Commun. Lett., 26 (12): 2994-2998 (2022)Security-Based Safety Hazard Analysis Using FMEA: A DAM Case Study., , , and . DEXA Workshops, volume 1479 of Communications in Computer and Information Science, page 18-30. Springer, (2021)Serving Federated Learning and Non-Federated Learning Users: A Massive MIMO Approach., , , and . SPAWC, page 1-5. IEEE, (2022)Computing Expectiles Using k-Nearest Neighbours Approach., , , , , , and . Symmetry, 13 (4): 645 (2021)A Comparative Study of Food Intake Detection Using Artificial Neural Network and Support Vector Machine., , , , and . ICMLA (1), page 153. IEEE, (2013)Real time monitoring and recognition of eating and physical activity with a wearable device connected to the eyeglass., and . ICST, page 1-6. IEEE, (2017)