Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An assumptive logic programming methodology for parsing., , and . ICTAI, page 11-18. IEEE Computer Society, (2000)Understanding and improving the culture of hackathons: Think global hack local., , and . FIE, page 1-8. IEEE Computer Society, (2015)Circuits and logic in the lab: toward a coherent picture of computation., , , and . WCCCE, page 7:1-7:5. ACM, (2010)Understanding "Bad Actors" Online., , , , and . CHI Extended Abstracts, ACM, (2018)Teaching CPU architecture: a new way to provide effective scaffolding., , , and . Koli Calling, page 149-150. ACM, (2012)Improving the Utility of Speech Recognition Through Error Detection., , and . J. Digital Imaging, 21 (4): 371-377 (2008)Not All Words Are Created Equal: Extracting Semantic Orientation as a Function of Adjective Relevance., and . Australian Conference on Artificial Intelligence, volume 4830 of Lecture Notes in Computer Science, page 337-346. Springer, (2007)Let's talk social media (abstract only).. SIGCSE, page 679. ACM, (2012)Application of a Non-Linear Autoassociator to Breast Cancer Diagnosis., and . ITCH, volume 164 of Studies in Health Technology and Informatics, page 269-273. IOS Press, (2011)An Assumptive Logic Programming Methodology for Parsing., , and . Int. J. Artif. Intell. Tools, 10 (4): 573-588 (2001)