Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concurrent Robin Hood Hashing., , and . OPODIS, volume 125 of LIPIcs, page 10:1-10:16. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2018)Deep brain stimulation may reduce tremor by preferential blockade of slower axons via antidromic activation., , , , and . CDC-ECE, page 6481-6486. IEEE, (2011)Binomial Checkpointing for Arbitrary Programs with No User Annotation., and . CoRR, (2016)Divide-and-Conquer Checkpointing for Arbitrary Programs with No User Annotation., and . CoRR, (2017)Efficient Implementation of a Higher-Order Language with Built-In AD., and . CoRR, (2016)The LOST Algorithm: Finding Lines and Separating Speech Mixtures., and . EURASIP J. Adv. Sig. Proc., (2008)Comments on 'Dynamic programming approach to optimal weight selection in multilayer neural networks' with reply., and . IEEE Trans. Neural Networks, 3 (6): 1028-1029 (1992)Sparsification for Monaural Source Separation., , , and . Blind Speech Separation, Springer, (2007)Constructing Time-Frequency Dictionaries for Source Separation via Time-Frequency Masking and Source Localisation., , and . ICA, volume 5441 of Lecture Notes in Computer Science, page 573-580. Springer, (2009)Oaklisp: An Object-Oriented Dialect of Scheme., and . Lisp and Symbolic Computation, 1 (1): 39-51 (1988)