Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Severe wind risk for Australia cities - A national risk assessment approach., , and . IGARSS, page 4707-4711. IEEE, (2007)Phase Transitions in Connectionist Models Having Rapidly Varying Connection Strengths., and . Neural Computation, 2 (4): 523-535 (1990)Automated modeling and robotic grasping of unknown three-dimensional objects., , and . ICRA, page 292-298. IEEE, (2008)Computer Generated Intelligent Companions for Distributed Virtual Environments., , , and . ICTAI, page 450-452. IEEE Computer Society, (1996)Automated test case generation from domain specific models of high-level requirements., , , , , and . RACS, page 505-508. ACM, (2015)Kung Fu Panda 3: mandarin lip-sync reanimation process and pipeline., , , , , , , , and . SIGGRAPH Talks, page 27:1-27:2. ACM, (2016)iFCP - A Protocol for Internet Fibre Channel Storage Networking., , , , and . RFC, (September 2005)Prioritisation, Resources and Search Terms: A Study of Decision-Making at the Virtual Reference Desk., , , , , and . ECDL, volume 5173 of Lecture Notes in Computer Science, page 106-116. Springer, (2008)Object oriented hardware synthesis and verification., , , , , , and . ISSS, page 189-194. ACM / IEEE Computer Society, (2001)Active inference, sensory attenuation and illusions., , , , and . Cognitive Processing, 14 (4): 411-427 (2013)