Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Vector Quantization., and . Data Compression Conference, page 13-22. IEEE Computer Society, (2001)Multi-Resolution Adaptation of the SPIHT Algorithm for Multiple Description., , and . Data Compression Conference, page 303-312. IEEE Computer Society, (2000)Generalized Multiple Description Vector Quantization., and . Data Compression Conference, page 3-12. IEEE Computer Society, (1999)MONOLOGUE: A Tool for Negotiating Exchanges of Private Information in E-Commerce., , , and . PST, (2005)Maintaining Preference Networks That Adapt to Changing Preferences., , and . Canadian AI, volume 7884 of Lecture Notes in Computer Science, page 89-99. Springer, (2013)How to Get There From Here: Scaling the Enterprise-Wide Mail Infrastructure.. LISA, page 131-138. USENIX, (1996)International statistics sources, and . Routledge, London u.a., (1995)Utility Estimation in Large Preference Graphs Using A* Search., , and . Canadian AI, volume 6657 of Lecture Notes in Computer Science, page 50-55. Springer, (2011)Predicting User Preferences Via Similarity-Based Clustering., , and . Canadian AI, volume 5032 of Lecture Notes in Computer Science, page 222-233. Springer, (2008)Exu: A System for Secure Delegation of Authority on an Insecure Network., and . LISA, page 89-94. USENIX, (1995)