Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear combinations of heuristics for examination timetabling., , , and . Ann. Oper. Res., 194 (1): 89-109 (2012)An explainable deep learning-enabled intrusion detection framework in IoT networks., , , , , and . Inf. Sci., (August 2023)Perturbation based privacy for time-series data. University of Illinois Urbana-Champaign, USA, (2010)Virtual Battery: An Energy Reserve Abstraction for Embedded Sensor Networks., , , , and . RTSS, page 123-133. IEEE Computer Society, (2008)A Symbolic Approach to Compute a Null-Space Basis in the Projection Method., and . ASCM, page 243-259. Springer, (2012)Adaptive MAC Protocol for Throughput Enhancement in Multihop Wireless Networks., and . Netw. Protoc. Algorithms, 7 (1): 84-97 (2015)Mining online shopping patterns and communities., , , , , , , , and . iiWAS, page 400-404. ACM, (2009)High-Fidelity Permeability and Porosity Prediction Using Deep Learning With the Self-Attention Mechanism., , , , , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 34 (7): 3429-3443 (July 2023)Patient-GAT: Sarcopenia Prediction using Multi-modal Data Fusion and Weighted Graph Attention Networks., , , and . SAC, page 614-617. ACM, (2023)The Sparse Regression Cube: A Reliable Modeling Technique for Open Cyber-Physical Systems., , , , and . ICCPS, page 87-96. IEEE Computer Society, (2011)