Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gaussian Process Regression constrained by Boundary Value Problems., , and . CoRR, (2020)POF-Darts: Geometric adaptive sampling for probability of failure., , , , and . Reliab. Eng. Syst. Saf., (2016)A Survey of Constrained Gaussian Process Regression: Approaches and Implementation Challenges., , , , and . CoRR, (2020)Comparing reproduced cyber experimentation studies across different emulation testbeds., , , , , , , , , and . CSET @ USENIX Security Symposium, page 63-71. ACM, (2021)Spectral neighbor analysis method for automated generation of quantum-accurate interatomic potentials., , , , and . J. Comput. Phys., (2015)Feedback density and causal complexity of simulation model structure., , , , , , and . J. Simulation, 17 (3): 229-239 (2023)Solving High-Dimensional Inverse Problems with Auxiliary Uncertainty via Operator Learning with Limited Data., , , and . CoRR, (2023)Verification of Cyber Emulation Experiments Through Virtual Machine and Host Metrics., , , , , , and . CSET @ USENIX Security Symposium, page 71-80. ACM, (2022)Model discrepancy calibration across experimental settings., and . Reliab. Eng. Syst. Saf., (2020)Spoke-Darts for High-Dimensional Blue-Noise Sampling., , , , , , , , and . CoRR, (2014)