Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collusion-Resistant Processing of SQL Range Predicates., , , , and . Data Sci. Eng., 3 (4): 323-340 (2018)Novel Relay Selection Rules for Average Interference-Constrained Cognitive AF Relay Networks., , and . IEEE Trans. Wirel. Commun., 14 (8): 4304-4315 (2015)Stationary system-length distribution of Markovian bulk service queue with modified bulk service rule and dynamic service rates., , and . Int. J. Comput. Math. Comput. Syst. Theory, 7 (1): 42-62 (2022)Scalable Polyhedral Verification of Recurrent Neural Networks., , , , , and . CAV (1), volume 12759 of Lecture Notes in Computer Science, page 225-248. Springer, (2021)Implementation of Kirchhoff-Helmholtz transform on GPU for use in digital in-line holographic microscopy., , , and . COMPUTE, page 9:1-9:9. ACM, (2014)Construction of concrete verification models from C++., , , , and . DAC, page 942-947. ACM, (2008)Provable Defense Against Geometric Transformations., , , and . ICLR, OpenReview.net, (2023)MedicalSum: A Guided Clinical Abstractive Summarization Model for Generating Medical Reports from Patient-Doctor Conversations., , , and . EMNLP (Findings), page 4741-4749. Association for Computational Linguistics, (2022)Efficient Secure k-Nearest Neighbours over Encrypted Data., , , , , , and . EDBT, page 564-575. OpenProceedings.org, (2018)Is Watermarking LLM-Generated Code Robust?, , , and . CoRR, (2024)