Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QUADS: question answering for decision support., , , and . SIGIR, page 375-384. ACM, (2014)A Base Camp for Scaling AI., , , , , , and . CoRR, (2016)Radio Networks Predictive Control of a T-type Inverter in Wind Energy., , , and . Int. J. Online Eng., 12 (12): 38-42 (2016)Perceptual Hashing of Color Images Using Interpolation Mapping and Non-negative Matrix Factorization., , , and . J. Inf. Hiding Multim. Signal Process., 8 (3): 525-535 (2017)An End-to-End Attack on Text CAPTCHAs., , , and . IEEE Trans. Inf. Forensics Secur., (2020)BEEP: A Python library for Battery Evaluation and Early Prediction., , , , , , , , , and 7 other author(s). SoftwareX, (2020)The Saddle Point Problem of Polynomials., , and . Found. Comput. Math., 22 (4): 1133-1169 (2022)CSE Framework: A UIMA-based Distributed System for Configuration Space Exploration., , , , , and . UIMA@GSCL, volume 1038 of CEUR Workshop Proceedings, page 14-17. CEUR-WS.org, (2013)Attendre: Wait To Attend By Retrieval With Evicted Queries in Memory-Based Transformers for Long Context Processing., and . CoRR, (2024)Hermitian Tensor Decompositions., and . SIAM J. Matrix Anal. Appl., 41 (3): 1115-1144 (2020)