Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Permissioned Blockchain Revisited: A Byzantine Game-Theoretical Perspective.. CoRR, (2020)Exploring reliability of exascale systems through simulations., , , and . SpringSim (HPC), page 1. ACM, (2013)Swift machine learning model serving scheduling: a region based reinforcement learning approach., , , , , and . SC, page 13:1-13:23. ACM, (2019)Weakly-Supervised Image Semantic Segmentation Based on Superpixel Region Merging., , , , , , and . Big Data Cogn. Comput., 3 (2): 31 (2019)Optimistic Sampling Strategy for Data-Efficient Reinforcement Learning., , , , and . IEEE Access, (2019)Semantically Secure Private Set Intersection over Outsourced Multi-Owner Secret-Shared Databases.. CoRR, (2023)Toward Efficient Homomorphic Encryption for Outsourced Databases through Parallel Caching., , , and . Proc. ACM Manag. Data, 1 (1): 66:1-66:23 (2023)A simulation-based optimization model for infrastructure planning for electric autonomous vehicle sharing., , and . Comput. Aided Civ. Infrastructure Eng., 36 (7): 858-876 (2021)INCHE: High-Performance Encoding for Relational Databases through Incrementally Homomorphic Encryption.. CoRR, (2021)UCM-Net: A Lightweight and Efficient Solution for Skin Lesion Segmentation using MLP and CNN., , and . CoRR, (2023)