Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certification codes for maliciousness detection in Physical-layer Network Coding., , , and . MILCOM, page 1-6. IEEE, (2012)Undermining children’s intrinsic interest with extrinsic reward: A test of the “overjustification” hypothesis., , and . Journal of Personality and Social Psychology, 28 (1): 129–137 (October 1973)Reinforcement Learning for Mixed Cooperative/Competitive Dynamic Spectrum Access., , , , , and . DySPAN, page 1-6. IEEE, (2019)A method for assessing the market potential of new energy-saving technologies., and . IEEE Trans. Syst. Man Cybern., 13 (1): 30-37 (1983)The ITC Lecture Series: An Experiment., and . ITC, page 925. IEEE Computer Society, (1995)PRESTO: A Multilingual Dataset for Parsing Realistic Task-Oriented Dialogs., , , , , , , , , and 6 other author(s). EMNLP, page 10820-10833. Association for Computational Linguistics, (2023)An MM-Based Algorithm for ℓ1-Regularized Least-Squares Estimation With an Application to Ground Penetrating Radar Image Reconstruction., , and . IEEE Trans. Image Processing, 25 (5): 2206-2221 (2016)The store-load address table and speculative register promotion., , and . MICRO, page 235-244. ACM/IEEE Computer Society, (2000)A Genetic System for Learning Models of Consumer Choice., and . ICGA, page 217-223. Lawrence Erlbaum Associates, (1987)When Does It Make cents to Give Up Physical Test Access?. ITC, page 111-119. IEEE Computer Society, (1994)