Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling jobs with chain precedence constraints and deteriorating jobs., , and . J. Oper. Res. Soc., 62 (9): 1765-1770 (2011)Modelling and model checking suspendible business processes via statechart diagrams and CSP, , , and . Science of Computer Programming, 65 (1): 14--29 (March 2007)Deep Learning-based Transformation Matrix Estimation for Bidirectional Interframe Prediction., , and . GCCE, page 726-730. IEEE, (2018)Joint Optimization of Stateful VNF Placement and Routing Scheduling in Software-Defined Networks., , , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 9-14. IEEE, (2018)Integrated deep learning model for predicting electrical power generation from wave energy converter., , and . ICAC, page 1-6. IEEE, (2019)SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning., , , and . WCNC, page 1-5. IEEE, (2020)Counterexample-Preserving Reduction for Symbolic Model Checking., , , , , and . J. Appl. Math., (2014)Adversarial Attack and Defense on Graph Data: A Survey., , , and . CoRR, (2018)Different Traffic Density Connectivity Probability Analysis in VANETs with Measured Data at 5.9 GHz., , , , , , , and . ITST, page 1-7. IEEE, (2018)S2PF: speculative symbolic PathFinder., , and . ACM SIGSOFT Softw. Eng. Notes, 37 (6): 1-5 (2012)