Author of the publication

RecTen: A Recursive Hierarchical Low Rank Tensor Factorization Method to Discover Hierarchical Patterns in Multi-modal Data.

, , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RecTen: A Recursive Hierarchical Low Rank Tensor Factorization Method to Discover Hierarchical Patterns in Multi-modal Data., , , and . CoRR, (2020)Using statistical data for reliable mobile communications., , , and . Wirel. Commun. Mob. Comput., 2 (1): 101-111 (2002)Link Homophily in the Application Layer and its Usage in Traffic Classification., , , and . INFOCOM, page 221-225. IEEE, (2010)Scalable Ad Hoc Routing: The Case for Dynamic Addressing., , and . INFOCOM, page 1108-1119. IEEE, (2004)The case for a systematic approach to wireless mobile network simulation., , and . J. High Speed Networks, 14 (3): 243-262 (2005)A user-friendly self-similarity analysis tool., , and . Comput. Commun. Rev., 33 (3): 81-93 (2003)Aggregated Multicast for Scalable QoS Multicast Provisioning., , , and . IWDC, volume 2170 of Lecture Notes in Computer Science, page 295-308. Springer, (2001)Multiple Identities in BitTorrent Networks., , and . Networking, volume 4479 of Lecture Notes in Computer Science, page 582-593. Springer, (2007)SourceFinder: Finding Malware Source-Code from Publicly Available Repositories in GitHub., , , , and . RAID, page 149-163. USENIX Association, (2020)RARE: A Systematic Augmented Router Emulation for Malware Analysis., , , , and . PAM, volume 10771 of Lecture Notes in Computer Science, page 60-72. Springer, (2018)