Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting augmented intelligence in the modeling of safety-critical autonomous systems., , , , , , and . Formal Aspects Comput., 33 (3): 343-384 (2021)FEDGE: An Interference-Aware QoS Prediction Framework for Black-Box Scenario in IaaS Clouds with Domain Generalization., , , , , , and . IPDPS, page 128-138. IEEE, (2024)Modeling Tobacco Traceability System Based on Blockchain and RFID Technologies., , , and . SmartIoT, page 241-245. IEEE, (2022)A Method of Uncertainty Measure in Set-Valued Ordered Information Systems., and . AICI (3), volume 7004 of Lecture Notes in Computer Science, page 595-603. Springer, (2011)A Differential Confocal Sensor for Simultaneous Position and Slope Acquisitions Based on a Zero-Crossing Prediction Algorithm., , , , , and . Sensors, 23 (3): 1453 (February 2023)Characterizing and Mitigating Anti-patterns of Alerts in Industrial Cloud Systems., , , , , and . DSN, page 393-401. IEEE, (2022)P4LRU: Towards An LRU Cache Entirely in Programmable Data Plane., , , , , , , , and . SIGCOMM, page 967-980. ACM, (2023)Survey on Biometric Data Security and Chaotic Encryption Strategy with Bernoulli Mapping., , , and . ICMB, page 174-180. IEEE, (2014)Parameters optimization of polygonal fuzzy neural networks based on GA-BP hybrid algorithm., , and . Int. J. Machine Learning & Cybernetics, 5 (5): 815-822 (2014)Adversarial Learning from Crowds., , , and . AAAI, page 5304-5312. AAAI Press, (2022)