Author of the publication

Maximum A Posteriori Path Estimation with Input Trace Perturbation: Algorithms and Application to Credible Rating of Human Routines.

, and . IJCAI, page 895-901. Professional Book Center, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognizing object manipulation activities using depth and visual cues., , , and . J. Vis. Commun. Image Represent., 25 (4): 719-726 (2014)Energy proportional image sensors for continuous mobile vision., , , , and . MobiSys, page 467-468. ACM, (2013)Sensor-Based Understanding of Daily Life via Large-Scale Use of Common Sense., , , , and . AAAI, page 906-912. AAAI Press, (2006)Relational Learning for Collective Classification of Entities in Images., , and . StarAI@AAAI, volume WS-10-06 of AAAI Technical Report, AAAI, (2010)Boosting the Throughput and Accelerator Utilization of Specialized CNN Inference Beyond Increasing Batch Size., , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 5731-5741. PMLR, (2021)Structure Learning on Large Scale Common Sense Statistical Models of Human State., , and . AAAI, page 1389-1395. AAAI Press, (2008)A Scalable Approach to Activity Recognition based on Object Use., , , , and . ICCV, page 1-8. IEEE Computer Society, (2007)Limiting Numerical Precision of Neural Networks to Achieve Real-Time Voice Activity Detection., , , , and . ICASSP, page 2236-2240. IEEE, (2018)Battery-free wireless identification and sensing., , , , , and . IEEE Pervasive Computing, 4 (1): 37-45 (2005)ID Modulation: Embedding Sensor Data in an RFID Timeseries., , , , , and . Information Hiding, volume 3727 of Lecture Notes in Computer Science, page 234-246. Springer, (2005)