Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment., , , and . CNSM, page 169-174. IEEE Computer Society, (2014)An Efficient Multi-Vehicle Routing Strategy for Goods Delivery Services., , , , and . ARSO, page 188-193. IEEE, (2021)Mimicking Expressiveness of Movements by Autistic Children in Game Play., , , , , and . SocialCom/PASSAT, page 944-949. IEEE Computer Society, (2012)Environmental Stress Testing with Boundary-Scan., , , , , , , , and . ITC, page 307-313. IEEE Computer Society, (1994)Understanding performance implications of nested file systems in a virtualized environment., , and . FAST, page 8. USENIX Association, (2012)An Effective Memory Optimization for Virtual Machine-Based Systems., and . IEEE Trans. Parallel Distributed Syst., 22 (10): 1705-1713 (2011)ZEETAD: Adapting Pretrained Vision-Language Model for Zero-Shot End-to-End Temporal Action Detection., , , , , and . CoRR, (2023)End-to-End Test Strategy for Wireless Systems., , and . ITC, page 940-946. IEEE Computer Society, (1995)A Secure Data Transmission Scheme for 1149.1 Backplane Test Bus., , and . ITC, page 789-796. IEEE Computer Society, (1995)ZEETAD: Adapting Pretrained Vision-Language Model for Zero-Shot End-to-End Temporal Action Detection., , , , , and . WACV, page 7031-7040. IEEE, (2024)