Author of the publication

Table War: A Tabletop Projection Game for Attack-and-Defence Battle.

, , , , , and . Conference on Designing Interactive Systems (Companion Volume), page 45-48. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters., , , , , and . ICITS, volume 10015 of Lecture Notes in Computer Science, page 3-23. (2016)A Cascade Sequence-to-Sequence Model for Chinese Mandarin Lip Reading., , and . MMAsia, page 32:1-32:6. ACM, (2019)Travelling waves and global attractivity of an SIRS disease model with spatial diffusion and temporary immunity., and . Appl. Math. Comput., (2013)Study of Dynamic Group Evolution for Health Prediction of Mangrove Ecosystem., , , , , and . IIAI-AAI, page 79-84. IEEE, (2019)Clustering of high-dimensional gene expression data with feature filtering methods and diffusion maps., , , and . Artif. Intell. Medicine, 48 (2-3): 91-98 (2010)An Improved Real Time Compressive Tracking., , and . ACPR, page 692-696. IEEE, (2013)Global Robust Exponential Stability of Uncertain Neutral High-Order Stochastic Hopfield Neural Networks with Time-Varying Delays., and . Neural Processing Letters, 32 (1): 83-96 (2010)Multistability and Multiperiodicity for a Class of Cohen-Grossberg BAM Neural Networks with Discontinuous Activation Functions and Time Delays., and . Neural Processing Letters, 42 (2): 417-435 (2015)Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters., , , , , and . IACR Cryptology ePrint Archive, (2015)Survey of clustering algorithms, and . Neural Networks, IEEE Transactions on, 16 (3): 645--678 (May 2005)