Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CUTIE: Learning to Understand Documents with Convolutional Universal Text Information Extractor., , and . CoRR, (2019)Necessary and sufficient condition for achieving the upper bound of quantum discord, , , and . CoRR, (2011)eRoc: A Distributed Blockchain System with Fast Consensus., , , , , and . CyberC, page 205-214. IEEE, (2019)Integrated multistage logistics network design by using hybrid evolutionary algorithm., , and . Comput. Ind. Eng., 56 (3): 854-873 (2009)Semiparametric estimation for the non-mixture cure model in case-cohort and nested case-control studies., and . Comput. Stat. Data Anal., (2020)Improvement in quality and productivity of an assembled product: A riskless approach., , and . Comput. Ind. Eng., (2016)Using Three-Dimensional Features to Improve Terrain Classification., , , , and . CVPR, page 915-920. IEEE Computer Society, (1997)Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing., , , and . COMPSAC Workshops, page 115-120. IEEE Computer Society, (2013)EEG-based Universal Prediction Model of Emergency Braking Intention for Brain-controlled Vehicles*., , , , and . NER, page 389-392. IEEE, (2019)ARMlock: Hardware-based Fault Isolation for ARM., , , and . ACM Conference on Computer and Communications Security, page 558-569. ACM, (2014)