Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting and Mitigating Data Integrity Attacks on Distributed Algorithms for Optimal Power Flow using Machine Learning., and . HICSS, page 3170-3181. ScholarSpace, (2024)Approaches to Assessing the Impact of E-Learning on Attainment II: The English Further Education Secor., , and . CELDA, page 297-304. IADIS, (2004)Detecting Shared Data Manipulation in Distributed Optimization Algorithms., , , , and . CoRR, (2023)Comparing Machine Learning and Optimization Approaches for the N - k Interdiction Problem Considering Load Variability., , , and . HICSS, page 2766-2775. ScholarSpace, (2023)PowerModelsADA: A Framework for Solving Optimal Power Flow using Distributed Algorithms., , , and . CoRR, (2023)Optimally Managing the Impacts of Convergence Tolerance for Distributed Optimal Power Flow., , and . CoRR, (2023)Windows of Driver Gaze Data: How Early and How Much for Robust Predictions of Driver Intent?, , , , and . ICANNGA, volume 7824 of Lecture Notes in Computer Science, page 446-455. Springer, (2013)Using Google Tools for Online Coursework: Student Perceptions., and . IEEE Trans. Emerg. Top. Comput., 4 (3): 385-391 (2016)Encouraging research into on-line learning and assessment., , , , and . ASCILITE, page 903-908. UNITEC Institute of Technology, Auckland, New Zealand, (2002)