Author of the publication

A Symbolic Approach to Compute a Null-Space Basis in the Projection Method.

, and . ASCM, page 243-259. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear combinations of heuristics for examination timetabling., , , and . Ann. Oper. Res., 194 (1): 89-109 (2012)An explainable deep learning-enabled intrusion detection framework in IoT networks., , , , , and . Inf. Sci., (August 2023)Perturbation based privacy for time-series data. University of Illinois Urbana-Champaign, USA, (2010)Virtual Battery: An Energy Reserve Abstraction for Embedded Sensor Networks., , , , and . RTSS, page 123-133. IEEE Computer Society, (2008)Hybridising heuristics within an estimation distribution algorithm for examination timetabling., , , and . Appl. Intell., 42 (4): 679-693 (2015)Enabling Experiments for Energy-Efficient Data Center Networks on OpenFlow-based Platform, , , , and . 4th International Conference on Communications and Electronics (ICCE 12), Hué, Vietnam, (August 2012)Comparative Study of Derivative Free Optimization Algorithms., , and . IEEE Trans. Ind. Informatics, 7 (4): 592-600 (2011)On Bounding Data Stream Privacy in Distributed Cyber-physical Systems., , and . SUTC/UMC, page 221-228. IEEE Computer Society, (2010)Neural Network Trainer through Computer Networks., , and . AINA, page 1203-1209. IEEE Computer Society, (2010)Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns., , and . SocialCom/PASSAT, page 974-980. IEEE Computer Society, (2011)