Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dell's Channel Transformation: Leveraging Operations Research to Unleash Potential Across the Value Chain., , , , , , , , , and 3 other author(s). Interfaces, 44 (1): 55-69 (2014)SURVEY OF WEB CRAWLING ALGORITHMS, , and . Advances in Vision Computing: An International Journal (AVC), 3 (3): 7 (September 2016)Saliency enabled compression in JPEG framework., and . IET Image Processing, 12 (7): 1142-1149 (2018)Area and power efficient ECC for multiple adjacent bit errors in SRAMs., and . ICCE, page 1-4. IEEE, (2020)Static Analysis Using the Cloud., , and . iFMCloud@IFM, volume 228 of EPTCS, page 2-15. (2016)Properties and astrophysical implications of the 150 Msun binary black hole merger GW190521, , , , , , , , , and 1248 other author(s). (2020)cite arxiv:2009.01190Comment: 39 pages, 13 figures; data available at https://dcc.ligo.org/P2000158-v4/public.Towards Re-Conceptualizing DSS: a Text Mining based Approach., and . ECIS, (2019)A Divisive Information-Theoretic Feature Clustering Algorithm for Text Classification., , and . J. Mach. Learn. Res., (2003)A context-aware robust intrusion detection system: a reinforcement learning-based approach., , , , and . Int. J. Inf. Sec., 19 (6): 657-678 (2020)A Novel Machine Learning Based Malware Detection and Classification Framework., , , , and . Cyber Security, page 1-4. IEEE, (2019)