Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WATTR: a method for self-powered wireless sensing of water activity in the home., , , , and . UbiComp, page 169-172. ACM, (2010)Keyboard Snooping from Mobile Phone Arrays with Mixed Convolutional and Recurrent Neural Networks., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (2): 45:1-45:22 (2019)Implicit-descriptor ligand-based virtual screening by means of collaborative filtering., , and . J. Cheminformatics, 10 (1): 56:1-56:20 (2018)The Impact of Business Analytics Strategy on Social, Mobile, and Cloud Computing Adoption., , , and . ICIS, Association for Information Systems, (2014)Most apparent distortion: full-reference image quality assessment and the role of strategy., and . J. Electronic Imaging, 19 (1): 011006 (2010)LAST: Latent Space-Assisted Adaptive Sampling for Protein Trajectories., , , , , and . J. Chem. Inf. Model., 63 (1): 67-75 (2023)On the Interpretability of Deep Learning Based Models for Knowledge Tracing., and . CoRR, (2021)AirWare: Utilizing Embedded Audio and Infrared Signals for In-Air Hand-Gesture Recognition., , , and . CoRR, (2021)A Photonic Physically Unclonable Function's Resilience to Multiple-Valued Machine Learning Attacks., , , , , , , and . CoRR, (2024)CNN-Assisted Steganography - Integrating Machine Learning with Established Steganographic Techniques., , , and . CoRR, (2023)