Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Anonymity of Home/Work Location Pairs., and . Pervasive, volume 5538 of Lecture Notes in Computer Science, page 390-397. Springer, (2009)On using existing time-use study data for ubiquitous computing applications., and . UbiComp, volume 344 of ACM International Conference Proceeding Series, page 144-153. ACM, (2008)Training Keyword Spotting Models on Non-IID Data with Federated Learning., , , , , , , and . INTERSPEECH, page 4343-4347. ISCA, (2020)Production federated keyword spotting via distillation, filtering, and joint federated-centralized training., , , , , , , , , and 2 other author(s). INTERSPEECH, page 76-80. ISCA, (2022)Localizing Tags Using Mobile Infrastructure., , and . LoCA, volume 4718 of Lecture Notes in Computer Science, page 279-296. Springer, (2007)Control generation for embedded systems based on composition of modal processes., , , and . ICCAD, page 46-53. ACM / IEEE Computer Society, (1998)Empirical measurements of intrabody communication performance under varied physical configurations., , , , , , and . UIST, page 183-190. ACM, (2001)Jointly Learning from Decentralized (Federated) and Centralized Data to Mitigate Distribution Shift., , , and . CoRR, (2021)Can magnetic field sensors replace gyroscopes in wearable sensing applications?, , , and . ISWC, page 1-4. IEEE Computer Society, (2010)Activity-based serendipitous recommendations with the Magitti mobile leisure guide., , , , , , , , , and 4 other author(s). CHI, page 1157-1166. ACM, (2008)