Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Cybersecurity into the Wisconsin K-12 Classroom., , and . COMPSAC (2), page 312-317. IEEE, (2019)A dynamic states reduction message passing algorithm for sparse code multiple access., , , and . WTS, page 1-5. IEEE, (2016)How the Great Recession affects performance: a case of Pennsylvania hospitals using DEA., , , , and . Annals OR, 278 (1-2): 77-99 (2019)Locally linear embedding with additive noise., , and . Pattern Recognition Letters, (2019)Maximizing Page-Level Cache Hit Ratios in LargeWeb Services., , , and . SIGMETRICS Performance Evaluation Review, 46 (2): 91-92 (2018)A Demonstration of the OtterTune Automatic Database Management System Tuning Service., , , , , , , , and . PVLDB, 11 (12): 1910-1913 (2018)Incorporating health outcomes in Pennsylvania hospital efficiency: an additive super-efficiency DEA approach., , , , and . Annals OR, 221 (1): 161-172 (2014)Discrete All-Pay Bidding Games., , and . CoRR, (2015)Language-independent pre-processing of large document bases for text classification.. University of Liverpool, UK, (2008)British Library, EThOS.Preliminary results of forecasting of the loop current system in Gulf of Mexico using robust principal component analysis., , , and . ISSPIT, page 1-5. IEEE, (2018)