Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pretrained Language Models are Symbolic Mathematics Solvers too!, , , , and . CoRR, (2021)Multi-criteria Consensus-Based Service Selection Using Crowdsourcing., , , , , and . AINA Workshops, page 114-120. IEEE Computer Society, (2014)Approximating the Inverse of a Square Matrix with Application in Computation of the Moore-Penrose Inverse., , and . J. Appl. Math., (2014)Security-aware web service composition approaches: state-of-the-art., , , , and . iiWAS, page 112-121. ACM, (2011)Frequent pattern mining algorithms in fog computing environments: A systematic review., , and . Concurr. Comput. Pract. Exp., (2022)Pre-Trained Language Transformers are Universal Image Classifiers., , , , , , and . CoRR, (2022)An Improvement of Ostrowski's and King's Techniques with Optimal Convergence Order Eight., , and . J. Optim. Theory Appl., 153 (1): 225-236 (2012)Finding generalized inverses by a fast and efficient numerical method., , and . J. Comput. Appl. Math., (2015)On Application of Ontology and Consensus Theory to Human-Centric IoT: An Emergency Management Case Study., , and . DSDIS, page 636-643. IEEE Computer Society, (2015)A taxonomy of trust oriented approaches for services computing., , , , and . iiWAS, page 353-358. ACM, (2011)