Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-document summarization via sentence-level semantic analysis and symmetric matrix factorization., , , and . SIGIR, page 307-314. ACM, (2008)Scheduling Tasks with Mixed Timing Constraints in GPU-Powered Real-Time Systems., , , , , , and . ICS, page 30:1-30:13. ACM, (2016)Integer ambiguity estimation and validation for precise GNSS positioning.. University of New South Wales, Sydney, Australia, (2013)base-search.net (ftunswworks:oai:unsworks.unsw.edu.au:1959.4/52977).Security Region Analysis with Artificial Noise Based on Secrecy Outage Probability., , , , and . MILCOM, page 336-340. IEEE, (2018)Preliminary Coherence Assessment of Gaofen-3 SAR Data., , , , , and . IGARSS, page 2172-2175. IEEE, (2018)Fast enumeration of maximal valid subgraphs for custom-instruction identification., , , and . CASES, page 29-36. ACM, (2009)A general model for clustering binary data.. KDD, page 188-197. ACM, (2005)Competition and Cooperation in Analog Neural Networks for Combinatorial Optimization (Abstract)., and . ACM Conference on Computer Science, page 444. ACM, (1990)Ranking user's relevance to a topic through link analysis on web logs., , , , and . WIDM, page 49-54. ACM, (2002)NMF and PLSI: equivalence and a hybrid algorithm., , and . SIGIR, page 641-642. ACM, (2006)