Author of the publication

Internet Abuse in the Workplace: New Trends in Risk Management.

, and . Cyberpsy., Behavior, and Soc. Networking, 7 (1): 105-111 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autonomous sign reading for semantic mapping., , , and . ICRA, page 3297-3303. IEEE, (2011)OpenSeq2Seq: extensible toolkit for distributed and mixed precision training of sequence-to-sequence models., , , , , and . CoRR, (2018)Internet Abuse in the Workplace: New Trends in Risk Management., and . Cyberpsy., Behavior, and Soc. Networking, 7 (1): 105-111 (2004)Employee Internet Management: Current Business Practices and Outcomes., and . Cyberpsy., Behavior, and Soc. Networking, 5 (4): 355-361 (2002)Electronic Mail Dysfunction: A Reality Check.. Cyberpsychology Behav. Soc. Netw., 2 (5): 413-418 (1999)Deep Speech: Scaling up end-to-end speech recognition., , , , , , , , , and 1 other author(s). CoRR, (2014)Deep Speech 2: End-to-End Speech Recognition in English and Mandarin., , , , , , , , , and 24 other author(s). CoRR, (2015)Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning., , , , , , , and . ICDAR, page 440-445. IEEE Computer Society, (2011)Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin., , , , , , , , , and 29 other author(s). ICML, volume 48 of JMLR Workshop and Conference Proceedings, page 173-182. JMLR.org, (2016)