Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Searching k-Nearest Neighbor Trajectories on Road Networks., , , , and . ADC, volume 10538 of Lecture Notes in Computer Science, page 85-97. Springer, (2017)User Preference Analysis for Most Frequent Peer/Dominator., , , , , and . IEEE Trans. Knowl. Data Eng., 31 (7): 1412-1425 (2019)Optimization of Static Task and Bus Access Schedules for Time-Triggered Distributed Embedded Systems with Model-Checking., , and . DAC, page 294-299. IEEE, (2007)An efficient technique for analysis of minimal buffer requirements of synchronous dataflow graphs with model checking., , , , and . CODES+ISSS, page 61-70. ACM, (2009)Online adaptive utilization control for real-time embedded multiprocessor systems., , , and . CODES+ISSS, page 85-90. ACM, (2008)EasySO: Exploration-enhanced Reinforcement Learning for Logic Synthesis Sequence Optimization and a Comprehensive RL Environment., , , , , and . ICCAD, page 1-9. IEEE, (2023)Mining target users for online marketing based on App Store data., , , , , and . IEEE BigData, page 1043-1052. IEEE Computer Society, (2015)Neural Fault Analysis for SAT-based ATPG., , , , , and . ITC, page 36-45. IEEE, (2022)L-QoCo: learning to optimize cache capacity overloading in storage systems., , , , , , and . DAC, page 379-384. ACM, (2022)Dynamic privacy management: a plug-in service for the middleware in pervasive computing., , and . Mobile HCI, page 1-8. ACM, (2005)