Author of the publication

Modern Subsampling Methods for Large-Scale Least Squares Regression.

, and . Int. J. Cyber Phys. Syst., 2 (2): 1-28 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

M.Sc. Yunxuan Li University of Stuttgart

CV-Priv : Towards a Context Model for Privacy Policy Creation for Connected Vehicles, , and . 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), page 583-588. IEEE, (2023)
CV-Priv : Towards a Context Model for Privacy Policy Creation for Connected Vehicles, , and . 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), page 583-588. IEEE, (2023)Privacy in Connected Vehicles: Perspectives of Drivers and Car Manufacturers, , , , and . Service-Oriented Computing : 17th Symposium and Summer School, SummerSOC 2023, Heraklion, Crete, Greece, June 25 – July 1, 2023, Revised Selected Papers, 1847, page 59-68. Cham, Springer, (2023)
 

Other publications of authors with the same name

Neighbor Gradient-based Multicast Routing for Service-Oriented Applications., , , , , and . TIIS, 6 (9): 2231-2252 (2012)Stability Criteria With Less LMI Variables for Neural Networks With Time-Varying Delay., , and . IEEE Trans. on Circuits and Systems, 55-II (11): 1188-1192 (2008)Aurora: A Cross-Layer Solution for Thermally Resilient Photonic Network-on-Chip., , , , , and . IEEE Trans. VLSI Syst., 23 (1): 170-183 (2015)Advanced modulation formats for short reach optical communication systems., , , , , and . IEEE Network, 27 (6): 6-13 (2013)Generalized energy-efficient algorithms for the RFID estimation problem., , , and . IEEE/ACM Trans. Netw., 20 (6): 1978-1990 (2012)Missing-Tag Detection and Energy-Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels., , , and . IEEE/ACM Trans. Netw., 22 (4): 1079-1091 (2014)Hierarchical document classification using automatically generated hierarchy., , and . J. Intell. Inf. Syst., 29 (2): 211-230 (2007)Distributed Consensus for Multiagent Systems with Communication Delays and Limited Data Rate., , and . SIAM J. Control and Optimization, 49 (6): 2239-2262 (2011)The impact of social cloud reputation and structure on rational computation., , , , and . J. High Speed Networks, 21 (3): 181-194 (2015)An immunity based network security risk estimation.. Science in China Series F: Information Sciences, 48 (5): 557-578 (2005)