Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inventory Pooling using Deep Reinforcement Learning., , , , and . SCC, page 259-267. IEEE, (2022)Blockchain Security when Messages are Lost., , and . ConsensusDay@CCS, page 1-14. ACM, (2022)Merkle Trees Optimized for Stateless Clients in Bitcoin., and . Financial Cryptography Workshops, volume 12676 of Lecture Notes in Computer Science, page 451-466. Springer, (2021)Structural Segmentation and Visualization of Sitar and Sarod Concert Audio., , , and . ISMIR, page 232-238. (2016)Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality., , , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 84-103. Springer, (2021)Spot collaborative shipping sans orchestrator using Blockchain., , , , , and . Blockchain, page 371-378. IEEE, (2020)Recovering a Hidden Community in a Preferential Attachment Graph., and . ISIT, page 2097-2101. IEEE, (2018)