Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing Interpretation of High-Resolution Aerial Imagery by Humans and Artificial Intelligence to Detect an Invasive Tree Species., , , , , , and . Remote. Sens., 13 (17): 3503 (2021)Detection confidence driven multi-object tracking to recover reliable tracks from unreliable detections., , , , , , , and . Pattern Recognit., (2023)Examining PhD Student Interest in Teaching: An Analysis of 19 Years of Historical Data (Abstract Only)., and . SIGCSE, page 713. ACM, (2017)AI-Assisted Scientific Data Collection with Iterative Human Feedback., , , , and . AAAI, page 5957-5966. AAAI Press, (2021)ContextType: using hand posture information to improve mobile touch screen text entry., , , , and . CHI, page 2795-2798. ACM, (2013)Let's Keep It Safe: Designing User Interfaces that Allow Everyone to Contribute to AI Safety., , , , , , and . CoRR, (2019)Reliable Multi-Object Tracking in the Presence of Unreliable Detections., , , , , , , and . CoRR, (2021)Sensor Network Security: Elliptic Curve Cryptography on SunSPOTs., , , , , and . ICWN, page 687-692. CSREA Press, (2008)Crowdsourcing Accurate and Creative Word Problems and Hints., , , and . HCOMP, page 12-21. AAAI Press, (2016)Practical error correction for resource-constrained wireless networks: unlocking the full power of the CRC., and . SenSys, page 3:1-3:14. ACM, (2013)