Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One-Way Cryptography., , , , , and . Security Protocols Workshop, volume 7114 of Lecture Notes in Computer Science, page 336-340. Springer, (2011)Designing Learning Control that is Close to Instability for Improved Parameter Identification., , and . HPSC, page 359-370. Springer, (2006)Approximating Knowledge of Cooking in High-Order Functions, a Case Study of Froglingo, , and . ICCBR-2010 Workshop Proceedings: Computer Cooking Contest Workshop, page 219-228. Bridgewater, New Jersey, USA, (June 2010)Open Data on GitHub: Unlocking the Potential of AI., , , , , and . CoRR, (2023)Building Real-World Chatbot Interviewers: Lessons from a Wizard-of-Oz Field Study., , , , and . IUI Workshops, volume 2327 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Hilbert space techniques for evaluating trade-offs in reactive power compensation., , , and . ISCAS (5), page 976-979. IEEE, (2004)Experiences in teaching an educational user-level operating systems implementation project., , , , , and . ACM SIGOPS Oper. Syst. Rev., 46 (2): 80-86 (2012)THC: Accelerating Distributed Deep Learning Using Tensor Homomorphic Compression., , , , , , , and . CoRR, (2023)Predicting housing prices and analyzing real estate market in the Chicago suburbs using Machine Learning., and . CoRR, (2022)Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System., , , , , and . USENIX Security Symposium, USENIX Association, (2011)