Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of classification methods in cultural modeling., , , , and . ISI, page 248-250. IEEE, (2009)Philosophical Principles of Data Discovery., , , , , , , and . CCTA (1), volume 545 of IFIP Advances in Information and Communication Technology, page 24-30. Springer, (2017)Agent-Based Social Simulation and Modeling in Social Computing., , , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 401-412. Springer, (2008)Many-Objective Test Database Generation for SQL., , , , and . PPSN (2), volume 12270 of Lecture Notes in Computer Science, page 229-242. Springer, (2020)Exact secrecy throughput capacity study in mobile ad hoc networks., , , , and . Ad Hoc Networks, (2018)Reinforcement learning based adaptive rate control for delay-constrained communications over fading channels., , and . IJCNN, page 1-7. IEEE, (2010)Multi-objective Evolutionary Algorithm for String SMT Solver Testing., , , , and . DSA, page 102-113. IEEE, (2021)Partition Based Differential Testing for Finding Embedded Code Generation Bugs in Simulink., , , and . DAC, page 1-6. IEEE, (2023)What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing., , , and . ICSE, page 712-723. IEEE / ACM, (2017)Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory., , , , , , and . Proc. ACM Manag. Data, 2 (1): 30:1-30:27 (February 2024)