Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proving Compatibility Using Refinement., , and . TPHOLs, volume 3223 of Lecture Notes in Computer Science, page 168-183. Springer, (2004)Hypersparse Traffic Matrix Construction using GraphBLAS on a DPU., , , , , , , , , and 3 other author(s). CoRR, (2023)The Effects of Dark Triad Traits and Perceived Law Enforcement Competence in Responding to Ransomware Attacks., , and . HICSS, page 4226-4235. ScholarSpace, (2024)Model Compression Using Optimal Transport., and . WACV, page 3645-3654. IEEE, (2022)Survey of Machine Learning Accelerators., , , , , and . HPEC, page 1-12. IEEE, (2020)pPython Performance Study., , , , , , , , , and 10 other author(s). HPEC, page 1-7. IEEE, (2023)Realizing Forward Defense in the Cyber Domain., , , , , , , , and . HPEC, page 1-7. IEEE, (2021)Maneuver Identification Challenge., , , , , , , , , and 1 other author(s). HPEC, page 1-7. IEEE, (2021)Python Implementation of the Dynamic Distributed Dimensional Data Model., , , , , , , , , and 10 other author(s). HPEC, page 1-8. IEEE, (2022)An Evaluation of Low Overhead Time Series Preprocessing Techniques for Downstream Machine Learning., , , , , , , , , and 1 other author(s). HPEC, page 1-6. IEEE, (2022)