Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mixed Precision Training., , , , , , , , , and 1 other author(s). ICLR (Poster), OpenReview.net, (2018)Towards a Data Driven Storage Infrastructure for Grids., , , , , and . PDPTA, page 179-184. CSREA Press, (2003)Online privacy as a collective phenomenon., , and . COSN, page 95-106. ACM, (2014)Remote-access education based on image acquisition and processing through the Internet., , and . IEEE Trans. Educ., 46 (1): 142-148 (2003)Unique on Facebook: formulation and evidence of (nano)targeting individual users with non-PII data., , , , and . Internet Measurement Conference, page 464-479. ACM, (2021)Emotions, Demographics and Sociability in Twitter Interactions., , , , and . ICWSM, page 201-210. AAAI Press, (2016)Security for smart mobile networks: The NEMESYS approach., , , , , , and . PRISMS, page 1-8. IEEE, (2013)Recognition of 3D Object from One Image Based on Projective and Permutative Invariants., , , , and . ICIAR (1), volume 3212 of Lecture Notes in Computer Science, page 705-712. Springer, (2004)Principles of Pervasive Cloud Monitoring., , and . ISCIS, page 117-124. Springer, (2014)Social resilience in online communities: the autopsy of friendster., , and . COSN, page 39-50. ACM, (2013)