Author of the publication

IEEE Access Special Section Editorial: Analysis and Synthesis of Large-Scale Systems.

, , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Supervised Bayesian Visual Imitation Learning Applied to Robotic Pouring., , , , and . ICIT, page 1-7. IEEE, (2024)A Primary Study of Heavy Baryons Lambda\_Q, Xi\_Q and Sigma\_Q, , and . (Feb 14, 2011)EKTELO: A Framework for Defining Differentially-Private Computations., , , , , and . SIGMOD Conference, page 115-130. ACM, (2018)Cryptanalysis of an image encryption scheme based on the Hill cipher, , and . CoRR, (2007)A Congestion Avoidance Algorithm Based on Fuzzy Controlling., , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 495-505. Springer, (2016)Extraction of Illumination-Invariant Features in Face Recognition by Empirical Mode Decomposition., and . ICB, volume 5558 of Lecture Notes in Computer Science, page 102-111. Springer, (2009)Multi-objective Investment Decision Making Based on an Improved SPEA2 Algorithm., and . ICAIS (1), volume 11632 of Lecture Notes in Computer Science, page 434-443. Springer, (2019)MILEAGE: Multiple Instance LEArning with Global Embedding., , , and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 82-90. JMLR.org, (2013)M3IC: Maximum Margin Multiple Instance Clustering., , , and . IJCAI, page 1339-1344. (2009)Bandwidth Exchange for enabling forwarding in wireless access networks., , and . PIMRC, page 2628-2632. IEEE, (2009)