Author of the publication

Tensor decomposition of Toeplitz Jacket matrices for big data processing.

, , , , and . BigComp, page 11-14. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vibration reliability analysis of turbine blade based on ANN and Monte Carlo simulation., and . ICNC, page 1934-1939. IEEE, (2010)Event Concealment and Concealability Enforcement in Discrete Event Systems Under Partial Observation., , and . CoRR, (2022)To Transmit or Not to Transmit: Optimal Sensor Schedule for Remote State Estimation of Discrete-Event Systems., , , and . CoRR, (2023)Regulation of immune responsiveness in vivo by disrupting an early T-cell signaling event using a cell-permeable peptide., , , , , , and . Plos One, 8 (5): e63645 (2013)A Bandwidth Allocation Algorithm Based on Historical QoS Metric for Adaptive Video Streaming., , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 917-925. Springer, (2005)Fostering artificial societies using social learning and social control in parallel emergency management systems., and . Frontiers Comput. Sci., 6 (5): 604-610 (2012)Semantic dependency network for lyrics generation from melody., , and . Neural Comput. Appl., 36 (8): 4059-4069 (2024)Edit Mechanism Synthesis for Opacity Enforcement Under Uncertain Observations., , , , and . IEEE Control. Syst. Lett., (2023)Effective Resource Utilization Schemes for Decode-and-Forward Relay Networks With NOMA., , , , , and . IEEE Access, (2019)EH Cognitive Network With NOMA: Perspective on Impact of Passive and Active Eavesdropping., , , , , , , and . IEEE Internet Things J., 11 (3): 5050-5062 (February 2024)