Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Late Breaking Results: Analytical Placement for 3D ICs with Multiple Manufacturing Technologies., , , , , and . DAC, page 1-2. IEEE, (2023)Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation Search., , and . ACIS-ICIS, page 1135-1140. IEEE Computer Society, (2007)Estimating Bus Cross-Sectional Flow Based on Machine Learning Algorithm Combined with Wi-Fi Probe Technology., , and . Sensors, 21 (3): 844 (2021)A tribal abstraction network for SNOMED CT target hierarchies without attribute relationships., , , , , , and . JAMIA, 22 (3): 628-639 (2015)Exploring Privacy-Accuracy Tradeoffs using DPComp., , , , , and . SIGMOD Conference, page 2101-2104. ACM, (2016)Principled Evaluation of Differentially Private Algorithms using DPBench., , , , and . SIGMOD Conference, page 139-154. ACM, (2016)A Hybrid Spatio-Temporal Data Model and Structure (HST-DMS) for Efficient Storage and Retrieval of Land Use Information., and . Trans. GIS, 8 (3): 351-366 (2004)A Novel Antenna Selection Scheme for Spatially Correlated Massive MIMO Uplinks with Imperfect Channel Estimation., , , and . VTC Spring, page 1-6. IEEE, (2015)SafePay: Protecting against credit card forgery with existing magnetic card readers., , and . CNS, page 164-172. IEEE, (2015)Advanced Grant-Free Transmission for Small Packets URLLC Services., , , , and . ICC Workshops, page 1-5. IEEE, (2019)