Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Techniques for privacy and authentication in personal communication systems.. IEEE Wirel. Commun., 2 (4): 6-10 (1995)Illuminati, and . Lübbe, Bastei, (2003)Demonstrating Advanced Machine Learning and Neuromorphic Computing Using IBM's NS16e., , , , , , and . SAI (1), volume 1228 of Advances in Intelligent Systems and Computing, page 1-11. Springer, (2020)Security Planning for Personal Communications.. ACM Conference on Computer and Communications Security, page 107-111. ACM, (1993)Melody Retrieval and Classification Using Biologically-Inspired Techniques., , , , and . EvoMUSART, volume 10198 of Lecture Notes in Computer Science, page 49-64. (2017)Online nemeth braille input/output using content MathML., , , , and . W4A, page 12:1-12:2. ACM, (2016)User Insights on Diversity in Music Recommendation Lists., , and . ISMIR, page 446-453. (2020)Towards Polyphony Reconstruction Using Multidimensional Multiple Sequence Alignment., , , and . EvoMUSART, volume 10198 of Lecture Notes in Computer Science, page 33-48. (2017)Sakrileg The Da Vinci Code. (2003)Visualizing Usage Data from a Diabetes Management System., , , , , , , , , and 10 other author(s). CGVC, page 1-9. Eurographics Association, (2020)