Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correction of phoneme recognition errors in word learning through speech interaction., , , , , and . SLT, page 360-365. IEEE, (2010)The power of indirect ties., , , , and . Comput. Commun., (2016)Applying Deep Learning to Continuous Bridge Deflection Detected by Fiber Optic Gyroscope for Damage Detection., , , and . Sensors, 20 (3): 911 (2020)Bad Apples Spoil the Fun: Quantifying Cheating in Online Gaming., , , and . ICWSM, page 496-506. AAAI Press, (2016)HA-CMNet: A Driver CTR Model for Vehicle-Cargo Matching in O2O Platform., , , , , and . ADMA (4), volume 14179 of Lecture Notes in Computer Science, page 648-664. Springer, (2023)Intelligent information sharing in digital watershed modeling for planning and management., and . Geoinformatics, page 1-6. IEEE, (2010)In-Network Processing for Low-Latency Industrial Anomaly Detection in Softwarized Networks., , , , and . GLOBECOM, page 1-7. IEEE, (2021)X-MAN: A Non-Intrusive Power Manager for Energy-Adaptive Cloud-Native Network Functions., , , , and . IEEE Trans. Netw. Serv. Manag., 19 (2): 1017-1035 (2022)Robot-directed speech detection using Multimodal Semantic Confidence based on speech, image, and motion., , , , , , , and . ICASSP, page 2458-2461. IEEE, (2010)Cheaters in the Steam Community Gaming Social Network, , , , , , , and . CoRR, (2011)