Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating information accessability and community adaptivity features for sustaining virtual learning communities, , , and . International Journal of Human-Computer Studies, (2003)Open-Sourcing Highly Capable Foundation Models: An evaluation of risks, benefits, and alternative methods for pursuing open-source objectives., , , , , , , , , and 12 other author(s). CoRR, (2023)Dark Energy Survey Year 3 Results: Point-Spread Function Modeling, , , , , , , , , and 72 other author(s). (2020)cite arxiv:2011.03409Comment: 19 pages, submitted to MNRAS. See https://www.darkenergysurvey.org/des-year-3-cosmology-results-papers/ for the full DES Y3 cosmology release.Tracing-by-Linking Group Signatures.. ISC, volume 3650 of Lecture Notes in Computer Science, page 149-163. Springer, (2005)QAM Symbol Error Rate in OFDM Systems Over Frequency-Selective Fast Ricean-Fading Channels., , and . IEEE Trans. Vehicular Technology, 57 (2): 1322-1325 (2008)Splay Trees for Data Compression., , , and . SODA, page 522-530. ACM/SIAM, (1995)Physically valid statistical models for human motion generation., , and . ACM Trans. Graph., 30 (3): 19:1-19:10 (2011)Bounds on the Sizes of Constant Weight Covering Codes., , and . Des. Codes Cryptogr., 5 (3): 217-239 (1995)Group Signature Where Group Manager, Members and Open Authority Are Identity-Based., , and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 468-480. Springer, (2005)Teaching for Conceptual Change in Security Awareness., and . IEEE Secur. Priv., 6 (6): 67-69 (2008)