Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On leveraging social relationships for decentralized privacy-preserving group communication., , , and . SNS, page 5. ACM, (2012)X3DBio1: a visual analysis tool for biomolecular structure exploration., , and . Visualization and Data Analysis, volume 8294 of SPIE Proceedings, page 82940S. SPIE, (2012)Parzen Window Approximation on Riemannian Manifold., and . CoRR, (2020)Can Self Reported Symptoms Predict Daily COVID-19 Cases?, , , , , , , , and . CoRR, (2021)Intent Classification from Code Mixed Input for Virtual Assistants., , , , , and . ICSC, page 108-111. IEEE, (2021)A Review of Data Security in Cloud Computing., , and . ICCCNT, page 1-4. IEEE, (2023)Ranking Summaries for Informativeness and Coherence without Reference Summaries., and . FLAIRS, page 104-109. AAAI Press, (2016)Spatial K-anonymity: A Privacy-preserving Method for COVID-19 Related Geo-spatial Technologies., , , , , , and . GISTAM, page 75-81. SCITEPRESS, (2021)Developing Surrogate Simulation Models for Computationally Intensive Real World Application., , and . MAICS, page 74-79. Omnipress, (2004)A closed form recursive solution for Maximum Correntropy training., and . ICASSP, page 2070-2073. IEEE, (2010)