Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Service Execution on Data Centers for Energy Efficiency and Quality of Service Monitoring., , and . SMC, page 103-108. IEEE, (2013)Categorizing Resources and Learners for a Finer-Grained Analysis of MOOC Viewing & Doing., , , , and . LWMOOCS, page 116-121. IEEE, (2019)Evolutionary and Generative Music Informs Music HCI - And Vice Versa., , and . Music and Human-Computer Interaction, Springer, (2013)Stratified locality-sensitive hashing for accelerated physiological time series retrieval., , and . EMBC, page 2479-2483. IEEE, (2016)Sign Bits Are All You Need for Black-Box Attacks., and . ICLR, OpenReview.net, (2020)STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code., , and . CoRR, (2020)Knowledge mining sensory evaluation data: genetic programming, statistical techniques, and swarm optimization., , and . Genet. Program. Evolvable Mach., 13 (1): 103-133 (2012)On the Application of Danskin's Theorem to Derivative-Free Minimax Optimization., , , and . CoRR, (2018)Genetic programming: a tutorial introduction.. GECCO (Companion), page 471-488. ACM, (2017)Multi-Line Batch Scheduling by Similarity., , and . GECCO (Companion), page 921-927. ACM, (2016)