Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structural-RNN: Deep Learning on Spatio-Temporal Graphs., , , and . CoRR, (2015)Threshold key issuing in identity-based cryptosystems., , , and . Comput. Stand. Interfaces, 29 (2): 260-264 (2007)PlanIt: A crowdsourcing approach for learning to plan paths from large scale preference feedback., , , and . ICRA, page 877-884. IEEE, (2015)Watch-Bot: Unsupervised learning for reminding humans of forgotten actions., , , , and . ICRA, page 2479-2486. IEEE, (2016)Reed Solomon Codes for Digital Fingerprinting., , and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 163-175. Springer, (2002)Towards Logically and Physically Secure Public-Key Infrastructures., and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 122-134. Springer, (2002)Learning Spatio-Temporal Structure from RGB-D Videos for Human Activity Detection and Anticipation., and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 792-800. JMLR.org, (2013)Robotic Object Detection: Learning to Improve the Classifiers Using Sparse Graphs for Path Planning., , and . IJCAI, page 2072-2078. IJCAI/AAAI, (2011)Toward Holistic Scene Understanding: Feedback Enabled Cascaded Classification Models., , , and . IEEE Trans. Pattern Anal. Mach. Intell., 34 (7): 1394-1408 (2012)3-D Depth Reconstruction from a Single Still Image., , and . Int. J. Comput. Vis., 76 (1): 53-69 (2008)