Author of the publication

Investigations in tree locking for compiled database applications.

, and . CASCON, page 217-231. IBM, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Human-Following Method by Fusing Kernelized Correlation Filter and Depth Information for Mobile Robot., , , , , and . ROBIO, page 2099-2104. IEEE, (2019)Improving Multilingual Semantic Textual Similarity with Shared Sentence Encoder for Low-resource Languages., , , , , , , and . CoRR, (2018)AR: Auto-Repair the Synthetic Data for Neural Machine Translation., , , , , and . CoRR, (2020)Optimization of IoT-Based Artificial Intelligence Assisted Telemedicine Health Analysis System., and . IEEE Access, (2021)A2R2: Robust Unsupervised Neural Machine Translation With Adversarial Attack and Regularization on Representations., , , and . IEEE Access, (2021)CoNFies: Controllable Neural Face Avatars., , and . CoRR, (2022)Quality-Driven Dynamic Scheduling for Real-Time Adaptive Applications on Multiprocessor Systems., , and . IEEE Trans. Computers, 62 (10): 2026-2040 (2013)Quality Optimization of Adaptive Applications via Deep Reinforcement Learning in Energy Harvesting Edge Devices., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 4873-4886 (2022)Instruct2Attack: Language-Guided Semantic Adversarial Attacks., , , , , , , and . CoRR, (2023)Dynamic Texture Recognition using PDV Hashing and Dictionary Learning on Multi-scale Volume Local Binary Pattern., , , and . CoRR, (2021)