Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Privacy of Counting Bloom Filters., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1488-1499 (March 2023)Text to Image Generation: Leaving no Language Behind., and . CoRR, (2022)Can Artificial Intelligence Reconstruct Ancient Mosaics?, , , and . CoRR, (2022)Attacking the Privacy of Approximate Membership Check Filters by Positive Concentration., , , , , and . IEEE Trans. Computers, 72 (5): 1409-1419 (May 2023)The continued usefulness of vocabulary tests for evaluating large language models., , , , , , and . CoRR, (2023)Estimation of Risk Levels for Building Construction Projects., , , , , and . ICCSA (3), volume 12251 of Lecture Notes in Computer Science, page 836-851. Springer, (2020)Unfinished Architectures: A Perspective from Artificial Intelligence., , and . CoRR, (2023)The Estimation of the Optimal Level of Productivity for Sponsors in the Recovery and Enhancement of the Historical-Architectural Heritage., , , , , and . ICCSA (5), volume 12253 of Lecture Notes in Computer Science, page 285-299. Springer, (2020)Beware of Words: Evaluating the Lexical Richness of Conversational Large Language Models., , , , and . CoRR, (2024)Latin and Greek in Computing: Ancient Words in a New World., , and . Computer, 55 (6): 66-72 (2022)