Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secondary Network Throughput Optimization of NOMA Cognitive Radio Networks Under Power and Secure Constraints., , , , , , and . IEEE Access, (2023)Gene set proximity analysis: expanding gene set enrichment analysis through learned geometric embeddings, with drug-repurposing applications in COVID-19., , , , , , and . Bioinform., (January 2023)Neural Bandits for Protein Sequence Optimization., , , and . CISS, page 188-193. IEEE, (2022)Genome-scale promoter engineering by coselection MAGE, , , , , and . Nat. Methods, (2012)CamouFinder: Finding Camouflaged Instances in Images., , , , , and . AAAI, page 16071-16074. AAAI Press, (2021)Bandit Theory and Thompson Sampling-Guided Directed Evolution for Sequence Optimization., , , , , , and . NeurIPS, (2022)Effektivitätsuntersuchung von FEM-Plattenelementen zur Behandlung von Spannungskonzentrationsproblemen. Uni Kaiserslautern, (1985)Action Recognition Based on Sequential 2D-CNN for Surveillance Systems., , and . IECON, page 3225-3230. IEEE, (2018)The Packed Interval Covering Problem is NP-complete., , , and . CoRR, (2019)Library-Based Attack Tree Synthesis., , and . GraMSec@CSF, volume 12419 of Lecture Notes in Computer Science, page 24-44. Springer, (2020)