Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Target localization in Wireless Sensor Networks with quantized data in the presence of Byzantine attacks., , , and . ACSCC, page 1669-1673. IEEE, (2011)Effectiveness of peer detailing in a diarrhea program in Nigeria., , , , , , , , , and 3 other author(s). IBM Journal of Research and Development, 61 (6): 1 (2017)Supporting Multiple Learning Experiences on a Childhood Vocabulary Tutoring Platform., , , and . ITS, volume 10858 of Lecture Notes in Computer Science, page 392-398. Springer, (2018)CEO problem for belief sharing., and . ITW, page 1-5. IEEE, (2015)Target localization in Wireless Sensor Networks using error correcting codes in the presence of Byzantines., , and . ICASSP, page 5195-5199. IEEE, (2013)Reliable classification by unreliable crowds., , and . ICASSP, page 5558-5562. IEEE, (2013)Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques., , , , and . IEEE Trans. Signal Processing, 61 (6): 1495-1508 (2013)Distributed Inference in Tree Networks using Coding Theory., , and . CoRR, (2014)Secure Networked Inference with Unreliable Data Sources, , and . Springer, (2018)Human-Machine Inference Networks for Smart Decision Making: Opportunities and Challenges., , and . ICASSP, page 6961-6965. IEEE, (2018)