Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The syntax of concealment: reliable methods for plain text information hiding., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050Y. SPIE, (2007)Modelling the Yield of Number Field Sieve Polynominals.. ANTS, volume 1423 of Lecture Notes in Computer Science, page 137-150. Springer, (1998)Schur aggregation for linear systems and determinants., , , , , and . Theor. Comput. Sci., 409 (2): 255-268 (2008)Additive preconditioning and aggregation in matrix computations., , , , , , and . Comput. Math. Appl., 55 (8): 1870-1886 (2008)Strudel: A Corpus-Based Semantic Model Based on Properties and Types., , , and . Cogn. Sci., 34 (2): 222-254 (2010)Computer supported collaborative learning through reflection on practice.. Oxford Brookes University, UK, (2001)British Library, EThOS.Foreign Disinformation in America and the U.S. Government's Ethical Obligations to Respond. Lecture Notes in Social Networks Springer, (2023)Selecting Corpus-Semantic Models for Neurolinguistic Decoding., , and . *SEM@NAACL-HLT, page 114-123. Association for Computational Linguistics, (2012)Representation of Word Meaning in the Intermediate Projection Layer of a Neural Language Model., , , and . BlackboxNLP@EMNLP, page 362-364. Association for Computational Linguistics, (2018)BrainBench: A Brain-Image Test Suite for Distributional Semantic Models., , and . EMNLP, page 2017-2021. The Association for Computational Linguistics, (2016)