Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Should purchasing activities be outsourced along with production?, , and . Eur. J. Oper. Res., 257 (2): 468-482 (2017)On "The Censored Newsvendor and the Optimal Acquisition of Information"., , and . Oper. Res., 53 (6): 1024-1026 (2005)Competition-driven modeling of temporal networks., , and . EPJ Data Sci., 10 (1): 30 (2021)Improving Generalization of Adversarial Training via Robust Critical Fine-Tuning., , , , and . ICCV, page 4401-4411. IEEE, (2023)Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme for Blockchain in a Privacy-Preserving Manner., , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 3794-3809 (December 2022)Leveraging Temporal and Topological Selectivities in Temporal-clique Subgraph Query Processing., , and . ICDE, page 672-683. IEEE, (2021)Combating product label misconduct: The role of traceability and market inspection., and . Eur. J. Oper. Res., 282 (2): 559-568 (2020)Costly information acquisition under horizontal competition., , and . Oper. Res. Lett., 46 (4): 418-423 (2018)A Survey on Evaluation of Large Language Models., , , , , , , , , and 6 other author(s). CoRR, (2023)Cluster-preserving sampling from fully-dynamic streaming graphs., , , , and . Inf. Sci., (2019)