Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A grid-based algorithm for on-device GSM positioning., , and . UbiComp, page 227-236. ACM, (2010)Low-resource Multi-task Audio Sensing for Mobile and Embedded Devices via Shared Deep Neural Network Representations., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 50:1-50:19 (2017)High-Assurance Systems (Introduction to the Special Section)., , and . Commun. ACM, 40 (1): 67 (1997)Cascade of Distributed and Cooperating Firewalls in a Secure Data Network., , and . IEEE Trans. Knowl. Data Eng., 15 (5): 1307-1315 (2003)Campaign rhetoric and the hide-and-seek game.. Social Choice and Welfare, 47 (3): 697-727 (2016)Voting with endogenous information acquisition: Experimental evidence., , and . Games Econ. Behav., (2017)Bunched LPCNet: Vocoder for Low-Cost Neural Text-To-Speech Systems., , , , , , , , and . INTERSPEECH, page 3565-3569. ISCA, (2020)NAS-Bench-ASR: Reproducible Neural Architecture Search for Speech Recognition., , , , , , , , and . ICLR, OpenReview.net, (2021)Heterogeneity Activity Recognition., , , , and . (October 2015)Optimal multihop routing. An iterative approach to TWDM embedding., , , and . LCN, page 92-101. IEEE Computer Society, (1995)