Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing the Spread of Cascades Using Network Design, , , , , , , , , and 1 other author(s). CoRR, (2012)Recognition using motion and shape., , and . ICPR (1), page 255-258. IEEE, (1992)Maximizing the Spread of Cascades Using Network Design., , , , , , , , , and 1 other author(s). UAI, page 517-526. AUAI Press, (2010)Development of a Robotic System for Automated Decaking of 3D-Printed Parts., , , , , and . ICRA, page 8202-8208. IEEE, (2020)A Replication Study for IoT Privacy Preferences., , , and . COINS, page 1-8. IEEE, (2021)IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems., , , , and . IEEE Access, (2020)Metrics for Student Classroom Engagement and Correlation to Software Assignment Plagiarism., , , , , and . SIGCSE (2), page 1141. ACM, (2022)Matching motion trajectories using scale-space., , and . Pattern Recognit., 26 (4): 595-610 (1993)Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment., and . ICCDA, page 54-59. ACM, (2017)The ESP DES-CBC Transform., , and . RFC, (August 1995)