Author of the publication

Intensity mapping with neutral hydrogen and the Hidden Valley simulations

, , , and . (2019)cite arxiv:1904.11923Comment: 36 pages, 21 figures.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CosmicRIM : Reconstructing Early Universe by Combining Differentiable Simulations with Recurrent Inference Machines, , , , and . (2021)cite arxiv:2104.12864Comment: Published as a workshop paper at ICLR 2021 SimDL Workshop.An Efficient Approach for Preventing Disclosure of Sensitive Association Rules in Databases., , and . IKE, page 303-309. CSREA Press, (2010)A novel framework for intrusion detection in cloud., , , , and . SIN, page 67-74. ACM, (2012)A Survey on Preserving Privacy for Sensitive Association Rules in Databases., , and . BAIP, volume 70 of Communications in Computer and Information Science, page 538-544. Springer, (2010)The DESI $N$-body Simulation Project II: Suppressing Sample Variance with Fast Simulations, , , , , , , , , and 12 other author(s). (2022)cite arxiv:2202.06074Comment: 20 pages, 25 figures, 1 table.Batch and match: black-box variational inference with a score-based divergence., , , , , , and . ICML, OpenReview.net, (2024)Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners., , and . ICCCNT, page 1-6. IEEE, (2019)Variational Inference with Gaussian Score Matching., , , , , and . NeurIPS, (2023)A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing., and . CICS, page 23-30. IEEE, (2013)A novel approach to detect extraneous network traffic from the compromised router., and . RAIT, page 352-358. IEEE, (2016)