Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Techniques for determining equality of the maximum nullity and the zero forcing number of a graph. (2019)cite arxiv:1912.07302.Proceedings of the Workshop on 3D Geometry Generation for Scientific Computing., , , , , , , , , and 19 other author(s). WACV (Workshops), page 762-766. IEEE, (2024)A Generalized Scheme for the Creation of Shared Secret Keys through Uncorrelated Reciprocal Channels in Multiple Domains., and . ICCCN, page 1-8. IEEE Computer Society, (2009)Focusing a radio signal and simultaneously nulling it at another location using time-reversal: Experimental results., , and . MILCOM, page 1-6. IEEE, (2012)A framework for incorporating insurance in critical infrastructure cyber risk strategies., , , , and . Int. J. Crit. Infrastructure Prot., (2016)Normal Tolerance Interval Procedures in the tolerance Package.. R J., 8 (2): 200 (2016)A Novel Mixture Model for Characterizing Human Aiming Performance Data., , , and . CoRR, (2022)Finite mixture-of-gamma distributions: estimation, inference, and model-based clustering., , , and . Adv. Data Anal. Classif., 13 (4): 1053-1082 (2019)Some dimension reduction strategies for the analysis of survey data., and . J. Big Data, (2017)An empirical semiparametric one-sided confidence bound for lower quantiles of distributions with positive support., , and . Qual. Reliab. Eng. Int., 40 (4): 1618-1635 (June 2024)