Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Evaluation of Novel AI Accelerators for Deep Learning Workloads., , , , , , , , , and 14 other author(s). PMBS@SC, page 13-25. IEEE, (2022)A Comprehensive Performance Study of Large Language Models on Novel AI Accelerators., , , , , , , , and . CoRR, (2023)Fast Uncertainty Sampling for Labeling Large E-mail Corpora., , and . CEAS, (2006)An architecture for virtual solution composition and deployment in infrastructure clouds., , , , , and . VTDC@ICAC, page 9-18. ACM, (2009)Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach., , , , and . SSTD, volume 5644 of Lecture Notes in Computer Science, page 44-61. Springer, (2009)Biologically Inspired Defenses Against Computer Viruses., , , , , and . IJCAI (1), page 985-996. Morgan Kaufmann, (1995)Parameter Identification and Dynamic Models of Socioeconomic Phenomena., , and . IEEE Trans. Syst. Man Cybern., 2 (4): 460-467 (1972)Pricing in Prosumer Aggregations using Reinforcement Learning., , , , , and . e-Energy, page 220-224. ACM, (2021)An evaluation system for the physical security of computing systems., , , and . ACSAC, page 232-243. IEEE, (1990)Continuous Convolutional Neural Networks for Disruption Prediction in Nuclear Fusion Plasmas., , and . CoRR, (2023)