Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aladdin: Optimized Maximum Flow Management for Shared Production Clusters., , , , , , and . IPDPS, page 696-707. IEEE, (2019)Automatic Cloud Removal from Multi-Temporal Landsat Collection 1 Data Using Poisson Blending., , , and . IGARSS, page 1661-1664. IEEE, (2019)Capacity approaching codes for relay channels., , and . ISIT, page 2. IEEE, (2004)Distributed data mining in grid computing environment., , and . Int. J. Web Grid Serv., 16 (3): 305-320 (2020)IMU-Aided Ultra-wideband Based Localization for Coal Mine Robots., , , , , and . ICIRA (1), volume 11740 of Lecture Notes in Computer Science, page 256-268. Springer, (2019)Digital Service Recommendation Study Based on Mobile Communication User Behavior Analysis., , , and . ICIBE, page 65-71. ACM, (2021)Hierarchical Network Based on the Fusion of Static and Dynamic Features for Speech Emotion Recognition., , , , and . ICASSP, page 6334-6338. IEEE, (2021)Large-scale Malware Automatic Detection Based On Multiclass Features and Machine Learning., , , , , and . CSAE, page 174:1-174:5. ACM, (2018)Ispy: detecting ip prefix hijacking on my own., , , , and . SIGCOMM, page 327-338. ACM, (2008)Entropy-Based Uncertainty Calibration for Generalized Zero-Shot Learning., , , and . ADC, volume 12610 of Lecture Notes in Computer Science, page 139-151. Springer, (2021)