Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Observations of the Boundary Layer in the Cape Grim Coastal Region: Interaction with Wind and the Influences of Continental Sources., , , , , , , and . Remote. Sens., 15 (2): 461 (January 2023)Letters to the Editor., , and . First Monday, (1999)Multiple Lexicon Generation based on Phonological Feature Trees., and . TALN (Posters), page 79-84. ATALA, (2004)Combined Gesture-Speech Analysis and Speech Driven Gesture Synthesis., , , , , , , , and . ICME, page 893-896. IEEE Computer Society, (2006)Facebook's Challenge to the Collection Limitation Principle., and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)On 'Infinite Basis Set Limits' in Molecular Electronic Structure Calculations., and . Comput. Chem., 25 (1): 109-115 (2001)XiSTS - XML in Speech Technology Systems., , and . NLPXML@COLING, (2002)Demon seed, 1987.. SIGGRAPH Electronic Art and Animation Catalog, page 90. ACM, (1998)An agent-based framework for auditory-visual speech investigation., and . AVSP, page 47-52. ISCA, (2005)New models for the management of public key infrastructure and root certification authorities.. Conference on Information Security Management & Small Systems Security, volume 154 of IFIP Conference Proceedings, page 221-230. Kluwer, (1999)