Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strategic management analysis: from data to strategy diagram by LLM., , and . CoRR, (2024)A Miniaturized MicroRNA Sensor Identifies Targets Associated with Weight Loss in a Diet and Exercise Intervention among Healthy Overweight Individuals., , , , , , , , and . Sensors, 22 (18): 6758 (2022)Changes in Web Client Access Patterns: Characteristics and Caching Implications, , , and . BUCS-TR-1998-023. Boston University Computer Science Department, (November 1998)adamdbradley/foresight.js. (2014)How to manage your inbox: is a once a day strategy best?, , , and . BCS HCI, page 20. British Computer Society, (2013)Reinforcement Learning with Human Feedback in Mountain Car., , and . AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, AAAI, (2011)Violence and the Digital Humanities Text as Pharmakon.. DH, page 123. Hamburg University Press, (2012)A Typed Model for Encoding-Based Protocol Interoperability., , and . ICNP, page 72-83. IEEE Computer Society, (2004)Typed Abstraction of Complex Network Compositions., , , and . ICNP, page 289-300. IEEE Computer Society, (2005)Basis token consistency: supporting strong Web cache consistency., and . GLOBECOM, page 2225-2229. IEEE, (2002)