Author of the publication

Image Forensics using Optimal Normalization in Challenging Environment.

, and . ICEIC, page 1-4. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable K-Medoids via True Error Bound and Familywise Bandits., , , and . CoRR, (2019)Impact of Job Allocation Strategies on Communication-Driven Coscheduling in Clusters., , , , and . Euro-Par, volume 2790 of Lecture Notes in Computer Science, page 160-168. Springer, (2003)Bagpipe: Accelerating Deep Recommendation Model Training., , , and . SOSP, page 348-363. ACM, (2023)Pufferfish: Communication-efficient Models At No Extra Cost., , and . MLSys, mlsys.org, (2021)Regularized Graph Convolutional Networks for Short Text Classification., , , , , and . COLING (Industry), page 236-242. International Committee on Computational Linguistics, (2020)The Impact of Noise on the Scaling of Collectives: A Theoretical Approach., , and . HiPC, volume 3769 of Lecture Notes in Computer Science, page 280-289. Springer, (2005)Monitoring optical modulation amplitude using a low-power CMOS circuit for thermal control of Si ring transmitters., , , , , , and . ECOC, page 1-3. IEEE, (2014)Adaptive incremental checkpointing for massively parallel systems., , , and . ICS, page 277-286. ACM, (2004)Image forgery detection using Markov features in undecimated wavelet transform., and . IC3, page 1-6. IEEE Computer Society, (2016)Co-Ordinated Coscheduling in Time-Sharing Clusters through a Generic Framework., , , , and . CLUSTER, page 84-91. IEEE Computer Society, (2003)