Author of the publication

Resistant learning on the envelope bulk for identifying anomalous patterns.

, , , and . IJCNN, page 3303-3310. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Threshold Times for k-Resilient Protocols., , and . ICPP (2), page 24-27. CRC Press, (1992)CORBA and DCOM: Side by Side, Step by Step and Layer by Layer, , , , , , and . C++ Report, (January 1998)Data Prefetching and Eviction Mechanisms of In-Memory Storage Systems Based on Scheduling for Big Data Processing., , , and . IEEE Trans. Parallel Distributed Syst., 30 (8): 1738-1752 (2019)ONE-IP: Techniques for Hosting a Service on a Cluster of Machines., , , , and . Comput. Networks, 29 (8-13): 1019-1027 (1997)Towards capacity and profit optimization of video-on-demand services in a peer-assisted IPTV platform., , , , , , , and . Multim. Syst., 15 (1): 19-32 (2009)A deep learning-based precision volume calculation approach for kidney and tumor segmentation on computed tomography images., , , , , , , , , and 1 other author(s). Comput. Methods Programs Biomed., (2022)Crowdsensing route reconstruction using portable bluetooth beacon-based two-way network., , and . UbiComp Adjunct, page 265-268. ACM, (2016)A Scalable Port Forwarding for P2P-Based Wi-Fi Applications., , , , and . WASA, volume 4138 of Lecture Notes in Computer Science, page 26-37. Springer, (2006)A cluster-based checkpointing scheme for mobile computing on wide area network., , and . Mobile Networks and Computing, volume 52 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 177-193. DIMACS/AMS, (1999)Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract., , , and . ISSRE Workshops, page 319-320. IEEE, (2020)