Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimal entropy of states emerging from noisy quantum channels., and . IEEE Trans. Inf. Theory, 47 (1): 192-209 (2001)Multiplicativity of superoperator norms for some entanglement breaking channels.. Quantum Inf. Comput., 14 (13-14): 1203-1212 (2014)Context-Based Bayesian Intent Recognition., , , , , and . IEEE Trans. Auton. Ment. Dev., 4 (3): 215-225 (2012)An Architecture for Understanding Intent Using a Novel Hidden Markov Formulation., , , , , and . Int. J. Humanoid Robotics, 5 (2): 203-224 (2008)Performance of IEEE 802.11 under Jamming., , , , , and . Mob. Networks Appl., 18 (5): 678-696 (2013)Ambiguities in estimates of critical exponents for long-range dependent processes, , and . Physica A: Statistical Mechanics and its Applications, 377 (1): 43--52 (Apr 1, 2007)A Vision-Based Architecture for Intent Recognition., , , , , and . ISVC (2), volume 4842 of Lecture Notes in Computer Science, page 173-182. Springer, (2007)Multi-Robot and Multi-Camera Patrolling., , , , , , , , , and . Handbook of Soft Computing for Video Surveillance, Chapman and Hall/CRC, (2012)Extranet Access Control.. Encyclopedia of Information Assurance, Taylor & Francis, (2011)Integrating Context into Intent Recognition Systems., , , , , and . ICINCO (2), page 315-320. INSTICC Press, (2010)