Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models, , , , , , , , , and 441 other author(s). (2022)cite arxiv:2206.04615Comment: 27 pages, 17 figures + references and appendices, repo: https://github.com/google/BIG-bench.Neuroscience data and tool sharing - A legal and policy framework for neuroinformatics., , , , , , , , , and 21 other author(s). Neuroinformatics, 1 (2): 149-165 (2003)SafeLife 1.0: Exploring Side Effects in Complex Environments., and . CoRR, (2019)Is Brain Emulation Dangerous?, and . J. Artif. Gen. Intell., 4 (3): 170-194 (2013)Why We Need An Open Wireless Movement. (April 2011)WilmaScope - A 3D Graph Visualization System., and . Graph Drawing Software, Springer, (2004)Simulation of the Effects of Global Normalization Procedures in Functional MRI., , , , , and . NeuroImage, 17 (2): 532-542 (2002)Explainable Machine Learning in Deployment., , , , , , , , , and . CoRR, (2019)Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web., , , , , , , , , and 2 other author(s). CCS, page 2473-2487. ACM, (2019)An observatory for the SSLiverse, and . URL: www. eff. org/files/DefconSSLiverse. pdf, (2010)Online; accessed 12-February-2013.