Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Adherence to Cognitive Behavioral Therapy for Insomnia through Machine and Social Persuasion., , , , , , , , , and 3 other author(s). GreenCom/iThings/CPScom, page 750-757. IEEE, (2013)Hand as Natural Man-Machine Interface in Smart Environments., , , and . SPPRA, page 117-122. IASTED/ACTA Press, (2006)Real-time physical activity monitoring by data fusion in body sensor networks., , and . FUSION, page 1-7. IEEE, (2007)ASP: A Fast Adversarial Attack Example Generation Framework based on Adversarial Saliency Prediction., , and . CoRR, (2018)Towards Robust Training of Neural Networks by Regularizing Adversarial Gradients., , , , and . CoRR, (2018)A systematic survey on automated concurrency bug detection, exposing, avoidance, and fixing techniques, , , and . Software Quality Journal, 26 (3): 855--889 (Sep 1, 2018)Bifurcation stabilization for nonlinear systems with double-zero eigenvalues.. ISCAS (3), page 743-746. IEEE, (2001)Mining Association Rules Based on Seed Items and Weights., , and . FSKD (1), volume 3613 of Lecture Notes in Computer Science, page 603-608. Springer, (2005)An RC-LDPC coded adaptive cooperative communication scheme based on the Mutual Information model., , and . ICCT, page 615-619. IEEE, (2013)Optimal Power Allocation and Rate Adaptation for Scalable Video over Multi-User MIMO., , and . GLOBECOM, page 1-6. IEEE, (2015)