Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards A Performance-Oriented Self-Adaptive System., , , and . Software Engineering Research and Practice, page 613-620. CSREA Press, (2007)A Flexible Mechanical Arm Based on Miura-Ori., , , , , and . ICIRA, volume 12595 of Lecture Notes in Computer Science, page 538-544. Springer, (2020)Performance Analysis of Whale Optimization Algorithm., , and . CSPS (2), volume 516 of Lecture Notes in Electrical Engineering, page 379-386. Springer, (2018)SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization., , , , , , , , , and 2 other author(s). WWW, page 2733-2744. ACM / IW3C2, (2021)Robotic Actuation and Control of a Catheter for Structural Intervention Cardiology., , , , , , , , and . IROS, page 5907-5913. IEEE, (2022)Automatic Interpretation of Dominant Rhythm in Awake Electroencephalogram Based on Coherence and Phase Analysis for Bipolar Derivation., , , , , , and . BMEI, page 1-5. IEEE, (2009)A low power lossy frame memory recompression algorithm., , , , and . APSIPA, page 1-4. IEEE, (2016)Latent time-frequency component analysis: A novel pitch-based approach for singing voice separation., , and . ICASSP, page 131-135. IEEE, (2015)A study of artificial bee colony variants for radar waveform design., and . EURASIP J. Wireless Comm. and Networking, (2016)Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection., , , , , and . Comput. Secur., (February 2024)