Author of the publication

Band-Limited Maximizers for a Fourier Extension Inequality on the Circle, II.

, , and . Exp. Math., 32 (2): 280-293 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Manycore Parallelism through OpenMP - High-Performance Scientific Computing with Xeon Phi., and . IWOMP, volume 8122 of Lecture Notes in Computer Science, page 45-57. Springer, (2013)Band-Limited Maximizers for a Fourier Extension Inequality on the Circle, II., , and . Exp. Math., 32 (2): 280-293 (April 2023)Magneto: A Versatile Multi-Limbed Inspection Robot., , , , , , , , and . IROS, page 2253-2260. IEEE, (2018)Electronic system hardware exploration in an inverted classroom., , , and . MWSCAS, page 578-581. IEEE, (2013)LC-GAP: Localized Coulomb Descriptors for the Gaussian Approximation Potential., , , and . Scientific Computing and Algorithms in Industrial Simulations, Springer, (2017)Detecting Spam Zombies by Monitoring Outgoing Messages., , , , , and . INFOCOM, page 1764-1772. IEEE, (2009)The role of communication values in swift starting action teams: IT insights from flight crew experience., , , and . Inf. Manag., 41 (8): 1043-1056 (2004)MC4: A Tempering Algorithm for Large-Sample Network Inference., , and . PRIB, volume 6282 of Lecture Notes in Computer Science, page 431-442. Springer, (2010)Detecting Spam Zombies by Monitoring Outgoing Messages., , , , , and . IEEE Trans. Dependable Secur. Comput., 9 (2): 198-210 (2012)Safeguarding Copyrighted Contents: Digital Libraries and Intellectual Property Management, CWRU's Rights Management System., , , , , , and . D Lib Mag., (1998)