Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Assurance Systems (Introduction to the Special Section)., , and . Commun. ACM, 40 (1): 67 (1997)Cascade of Distributed and Cooperating Firewalls in a Secure Data Network., , and . IEEE Trans. Knowl. Data Eng., 15 (5): 1307-1315 (2003)Campaign rhetoric and the hide-and-seek game.. Social Choice and Welfare, 47 (3): 697-727 (2016)Low-resource Multi-task Audio Sensing for Mobile and Embedded Devices via Shared Deep Neural Network Representations., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 50:1-50:19 (2017)Voting with endogenous information acquisition: Experimental evidence., , and . Games Econ. Behav., (2017)A grid-based algorithm for on-device GSM positioning., , and . UbiComp, page 227-236. ACM, (2010)Sumformer: A Linear-Complexity Alternative to Self-Attention for Speech Recognition., , , and . CoRR, (2023)Bunched LPCNet: Vocoder for Low-Cost Neural Text-To-Speech Systems., , , , , , , , and . INTERSPEECH, page 3565-3569. ISCA, (2020)Heterogeneity Activity Recognition., , , , and . (October 2015)Deterministic Binary Filters for Convolutional Neural Networks., , , , , and . IJCAI, page 2739-2747. ijcai.org, (2018)