Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversible Spiking Neural P Systems with Anti-spikes., , , , , and . BIC-TA, volume 1363 of Communications in Computer and Information Science, page 513-533. Springer, (2020)MBITP: A Map Based Indoor Target Prediction in Smartphone., and . ICYCSEE, volume 503 of Communications in Computer and Information Science, page 228-236. Springer, (2015)A Study of Variable-Role-based Feature Enrichment in Neural Models of Code., , , , and . InteNSE@ICSE, page 14-20. IEEE, (2023)Adaptive convolutional dictionary learning for denoising seismocardiogram to enhance the classification performance of aortic stenosis., , , , and . Comput. Biol. Medicine, (January 2024)Intensity Equalization of Bidirectional Fiber Laser Based on a Non-Reciprocal Optical Attenuator., , , and . Sensors, 23 (9): 4360 (2023)Accurate Polygonal Mapping of Buildings in Satellite Imagery., , , and . CoRR, (2022)Everyone-Centric Heterogeneous Multi-Server Computation Offloading in ITS with Pervasive AI., , , , , , and . IEEE Netw., 37 (2): 62-68 (March 2023)Can Identifier Splitting Improve Open-Vocabulary Language Model of Code?, , , , and . SANER, page 1134-1138. IEEE, (2022)How to better utilize code graphs in semantic code search?, , , , , , , and . ESEC/SIGSOFT FSE, page 722-733. ACM, (2022)Combining Software Metrics and Text Features for Vulnerable File Prediction., , , , , and . ICECCS, page 40-49. IEEE Computer Society, (2015)