Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TURAN: Evolving non-deterministic players for the iterated prisoner's dilemma., , , and . IEEE Congress on Evolutionary Computation, page 21-27. IEEE, (2014)An efficient distance metric for linear genetic programming., , and . GECCO, page 925-932. ACM, (2013)Malware Obfuscation through Evolutionary Packers., , , , and . GECCO (Companion), page 757-758. ACM, (2015)Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms., , , , and . CoRR, (2018)Exploiting Evolutionary Computation in an Industrial Flow for the Development of Code-Optimized Microprocessor Test Programs., , , and . GECCO (Companion), page 1465-1466. ACM, (2015)Identification and Rejuvenation of NBTI-Critical Logic Paths in Nanoscale Circuits., , , , , , , , , and 2 other author(s). J. Electron. Test., 32 (3): 273-289 (2016)Conformer with dual-mode chunked attention for joint online and offline ASR., , , , , and . INTERSPEECH, page 2053-2057. ISCA, (2022)ChannelAugment: Improving Generalization of Multi-Channel ASR by Training with Input Channel Randomization., , , and . ASRU, page 824-829. IEEE, (2021)Evolutionary optimization of wetlands design., , , , and . SAC, page 176-181. ACM, (2013)On test program compaction., , and . ETS, page 1-6. IEEE, (2015)