Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Constraint Programming, , , , , , and . Working Notes of the 2014 NIPS Workshop on Probabilistic Programming, (2014)Intratumoral injection of the seasonal flu shot converts immunologically cold tumors to hot and serves as an immunotherapy for cancer, , , , , , , , , and 38 other author(s). Proc Natl Acad Sci U S A, (December 2019)Low-Cost Space-Borne Processing on a Reconfigurable Parallel Architecture., , , and . ERSA, page 93-99. CSREA Press, (2004)A language model for very large-vocabulary speech recognition, , and . Computer Speech and Language, (1992)Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS), , , , and . RFC 4492 (Informational), (May 2006)Updated by RFC 5246.Consensus clustering on data fragments., , , and . ICASSP, page 4631-4635. IEEE, (2017)Fast search strategy in a large vocabulary speech recognizer, , and . Journal of the Acoustical Society of America, (1988)Fast search strategy in a large vocabulary word recognizer, , and . Journal of the Acoustical Society of America, 84 (6): 2007--2017 (December 1988)A patient-specific visualization tool for comprehensive analysis of coronary CTA and perfusion MRI data., , , , , , , , , and . Medical Imaging: Image-Guided Procedures, volume 7964 of SPIE Proceedings, page 796410. SPIE, (2011)Dynamic Host Configuration Protocol (DHCPv4) Configuration of IPsec Tunnel Mode, , , and . RFC 3456 (Proposed Standard), (January 2003)