Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Composability of Reliable Unicast and Broadcast., , , and . ICDCN, volume 5935 of Lecture Notes in Computer Science, page 54-66. Springer, (2010)Brief announcement: global consistency can be easier than point-to-point communication., , , , and . PODC, page 310-311. ACM, (2009)JobScan., and . CompSysTech, page 352-359. ACM, (2012)Noisy Text Data: Achilles' Heel of popular transformer based NLP models., , , and . CoRR, (2021)From Gene to Drug: A Proof of Concept for a Plausible Computational Pathway., , , , , , , , , and 8 other author(s). ISDA (1), page 1147-1152. IEEE Computer Society, (2006)User Generated Data: Achilles' heel of BERT., , and . CoRR, (2020)Authenticated Byzantine Generals in Dual Failure Model., , , and . IACR Cryptology ePrint Archive, (2008)Exploring advantages and difficulties of Internet of Things (IoT) in Health care., , , and . ICCCNT, page 1-6. IEEE, (2023)Novel Methodology to Optimize TAT and Resource Utilization for ATPG Simulations for Large SoCs., , , and . ITC, page 60-64. IEEE, (2023)Data-Centric Approach to Hepatitis C Virus Severity Prediction., , , and . ISDA, volume 418 of Lecture Notes in Networks and Systems, page 421-431. Springer, (2021)