Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effects of Market Liberalization on the Relative Earnings of Chinese Women, and . Journal of Comparative Economics, 30 (4): 709--731 (December 2002)Characterization Framework and Design Patterns for the Disadvantaged User., , , , , , , and . ICNS, page 147-152. IEEE Computer Society, (2008)Identifying Patients with Pain in Emergency Departments using Conventional Machine Learning and Deep Learning., , , and . ALTA, page 111-119. Australasian Language Technology Association, (2019)Micro Service Architecture. (2013)Matching in Proximity Authentication and Mobile Payment EcoSystem: What Are We Missing?, , and . RFIDSec, volume 10155 of Lecture Notes in Computer Science, page 163-172. Springer, (2016)Digital Games and Science Learning: Design Principles and Processes to Augment Commercial Game Design Conventions., , , , , , , , , and 1 other author(s). AIED Workshops, volume 1009 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)On using a hardware monitor as an intelligent peripheral., and . SIGMETRICS Perform. Evaluation Rev., 2 (4): 3-19 (1973)Detection of subclinical atherosclerosis by image-based deep learning on chest x-ray., , , , , , , , , and 9 other author(s). CoRR, (2024)Integrating AGV Schedules in a Scheduling System for a Flexible Manufacturing Environment., and . ICRA, page 3149-3154. IEEE Computer Society, (1994)The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing., , , , and . Cryptologia, 36 (1): 70-79 (2012)