Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The power of indirect ties., , , , and . Computer Communications, (2016)Bad Apples Spoil the Fun: Quantifying Cheating in Online Gaming., , , and . ICWSM, page 496-506. AAAI Press, (2016)A Survey of Socially Aware Peer-to-Peer Systems., and . ACM Comput. Surv., 49 (1): 9:1-9:28 (2016)Correction of phoneme recognition errors in word learning through speech interaction., , , , , and . SLT, page 360-365. IEEE, (2010)A risk analysis information model with uncertainty for flood hazard of dam-break., , and . Geoinformatics, page 1-6. IEEE, (2010)Latency Measurement of Service Function Chaining on OpenStack Platform., , , and . LCN, page 473-476. IEEE, (2018)Grounding New Words on the Physical World in Multi-Domain Human-Robot Dialogues., , , , , , , , , and 3 other author(s). AAAI Fall Symposium: Dialog with Robots, volume FS-10-05 of AAAI Technical Report, AAAI, (2010)The power of indirect ties in friend-to-friend storage systems., , , , and . P2P, page 1-5. IEEE, (2014)The power of indirect social ties., , , , and . CoRR, (2014)Cheaters in the Steam Community Gaming Social Network, , , , , , , and . CoRR, (2011)