Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Attacks on Binary Image Recognition Systems., , , , , and . CoRR, (2020)A new family of semidynamic and dynamic flip-flops with embedded logic for high-performance processors., , , , , , , , and . IEEE J. Solid State Circuits, 34 (5): 712-716 (1999)A multi-level architecture for distributed object bases., , , and . Data Knowl. Eng., 60 (1): 150-184 (2007)A Three-Level Architecture for Distributed Web Information Systems., , , and . ICWE, volume 3140 of Lecture Notes in Computer Science, page 137-141. Springer, (2004)Power enhancement via multivariate outlier testing with gene expression arrays., , , , and . Bioinform., 25 (1): 48-53 (2009)Modeling Information Manufacturing Systems to Determine Information Product Quality, , , and . Manage. Sci., 44 (4): 462--484 (1998)IPMAP Research Status and Direction., and . ICIQ, page 500-517. MIT, (2007)Measuring Stakeholders' Perceptions of Cybersecurity for Renewable Energy Systems., , , , , , , , and . DARE@PKDD/ECML, volume 10097 of Lecture Notes in Computer Science, page 67-77. (2016)Irregular Solutions of an Ill-Posed Problem., and . CSC, page 209-215. CSREA Press, (2006)Populating the Semantic Web by Macro-reading Internet Text, , , , and . ISWC '09: Proceedings of the 8th International Semantic Web Conference, page 998--1002. Berlin, Heidelberg, Springer-Verlag, (2009)