Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Target-small decoy search strategy for false discovery rate estimation., , and . BMC Bioinform., 20 (1): 438:1-438:6 (2019)D-FEND: a diffusion-based fake news detection framework for news articles related to COVID-19., , , , , and . SAC, page 1771-1778. ACM, (2022)MIMO Communication Based on Adaptive Passive Time Reversal in Deep Water., , , , and . ICUFN, page 49-51. IEEE, (2019)AniFilter: parallel and failure-atomic cuckoo filter for non-volatile memories., , , , and . EuroSys, page 21:1-21:15. ACM, (2020)Incremental redundancy to reduce data retention errors in flash-based SSDs., , , , and . MSST, page 1-13. IEEE Computer Society, (2015)Deleting Keys of B-trees in Parallel., , and . IPDPS, IEEE Computer Society, (2002)An Efficient Index Data Structure with the Capabilities of Suffix Trees and Suffix Arrays for Alphabets of Non-negligible Size., , and . SPIRE, volume 3246 of Lecture Notes in Computer Science, page 138-149. Springer, (2004)Finding Optimal Alignment and Consensus of Circular Strings., , , , and . CPM, volume 6129 of Lecture Notes in Computer Science, page 310-322. Springer, (2010)Safe and Practical GPU Computation in TrustZone., and . EuroSys, page 505-520. ACM, (2023)Fast prime generation algorithms using proposed GCD test on mobile smart devices., and . BigComp, page 374-377. IEEE Computer Society, (2016)