Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-level trajectory modeling for video copy detection., , , , , and . ICASSP, page 2378-2381. IEEE, (2010)Distributed cooperative location estimation (D-COOLEST) in wireless environments., , , , , and . ICT, page 872-878. IEEE, (2010)Probabilistic Cooperative Location Estimation in Wireless Networks., , , , , and . WCNC, page 1-6. IEEE, (2010)Source location privacy against laptop-class attacks in sensor networks., , , , and . SecureComm, page 5. ACM, (2008)Learning-based Control of Unknown Linear Systems with Thompson Sampling., , and . CoRR, (2017)Learning Latent State Spaces for Planning through Reward Prediction., , , and . CoRR, (2019)Copyright Protection Application Based on Blockchain Technology., , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1271-1274. IEEE, (2019)Optimal relay selection with non-negligible probing time., , and . ICC, page 2227-2232. IEEE, (2015)A class of quadratic forms and the associated few-weight codes., , and . Discret. Math., 346 (12): 113640 (December 2023)Reconnaissance for Reinforcement Learning with Safety Constraints., , , , , and . ECML/PKDD (2), volume 12976 of Lecture Notes in Computer Science, page 567-582. Springer, (2021)