Author of the publication

DTN Routing Optimised by Human Routines: The HURRy Protocol.

, , and . WWIC, volume 9071 of Lecture Notes in Computer Science, page 299-312. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Filtering of nonlinear time-series coupled by fractional Gaussian processes., , and . CAMSAP, page 489-492. IEEE, (2015)Bayesian bandits: balancing the exploration-exploitation tradeoff via double sampling., and . CoRR, (2017)DTN Routing Optimised by Human Routines: The HURRy Protocol., , and . WWIC, volume 9071 of Lecture Notes in Computer Science, page 299-312. Springer, (2015)Estimation of ARMA state processes by particle filtering., and . ICASSP, page 8033-8037. IEEE, (2014)A Generative Modeling Approach to Calibrated Predictions: A Use Case on Menstrual Cycle Length Prediction., , , , , and . MLHC, volume 149 of Proceedings of Machine Learning Research, page 535-566. PMLR, (2021)Multi-armed bandits for resource efficient, online optimization of language model pre-training: the use case of dynamic masking., , , and . ACL (Findings), page 10609-10627. Association for Computational Linguistics, (2023)REDFLAG: A Run-timE, Distributed, Flexible, Lightweight, And Generic Fault Detection Service for Data-Driven Wireless Sensor Applications., , and . PerCom, page 1-9. IEEE Computer Society, (2009)Sequential Monte Carlo methods under model uncertainty., , and . SSP, page 1-5. IEEE, (2016)Particle filtering of ARMA processes of unknown order and parameters., and . ICASSP, page 4105-4109. IEEE, (2015)On the Design of a Scalable Multimedia Streaming System based on Receiver-driven Flow and Congestion Awareness., , , , and . SIGMAP, page 39-45. SciTePress, (2010)