Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polarization, Partisanship and Junk News Consumption over Social Media in the US., , , , , and . CoRR, (2018)Visual knitting machine programming., , , and . ACM Trans. Graph., 38 (4): 63:1-63:13 (2019)Enabling Semantic Understanding of Situations from Contextual Data In A Privacy-Sensitive Manner., , and . Activity Context Representation, volume WS-11-04 of AAAI Technical Report, AAAI, (2011)A learning based approach to modelling bilateral adaptive agent negotiations.. University of Southampton, UK, (2008)British Library, EThOS.Handover Key Management and Re-Authentication Problem Statement., , , and . RFC, (March 2008)Distance between extremum graphs., , and . PacificVis, page 263-270. IEEE Computer Society, (2015)Qualcomm Context-Awareness Symposium Sets Research Agenda for Context-Aware Smartphones., , , , , and . IEEE Pervasive Computing, 11 (1): 76-79 (2012)Activity and device position recognition in mobile devices., , , , and . UbiComp, page 591-592. ACM, (2011)Automatic Machine Knitting of 3D Meshes., , , , and . ACM Trans. Graph., 37 (3): 35:1-35:15 (2018)Learning to Negotiate Optimally in Non-stationary Environments., and . CIA, volume 4149 of Lecture Notes in Computer Science, page 288-300. Springer, (2006)