Author of the publication

Learning and Bayesian Shape Extraction for Object Recognition.

, , and . ECCV (4), volume 3024 of Lecture Notes in Computer Science, page 62-73. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Three Dimensional Information Extraction and Applications to Video Analysis., and . Video Search and Mining, volume 287 of Studies in Computational Intelligence, Springer, (2010)Sparsity as the Implicit Gating Mechanism for Residual Blocks., and . IJCNN, page 1-6. IEEE, (2019)An Analysis on the Learning Rules of the Skip-Gram Model., , and . IJCNN, page 1-8. IEEE, (2019)Product tree quantization for approximate nearest neighbor search., and . ICIP, page 2035-2039. IEEE, (2015)Shape of Elastic Strings in Euclidean Space., , and . Int. J. Comput. Vis., 82 (1): 96-112 (2009)Intrinsic generalization analysis of low dimensional representations., , and . Neural Networks, 16 (5-6): 537-545 (2003)A Prototype of the Web-Based Marine Training Environment., , and . ICWL, volume 3583 of Lecture Notes in Computer Science, page 78-85. Springer, (2005)Analytical Image Models and Their Applications., , and . ECCV (1), volume 2350 of Lecture Notes in Computer Science, page 37-51. Springer, (2002)Preventing cascading event: a distributed cyber-physical approach., , , and . CSIIRW, page 54. ACM, (2011)Trusted Group Key Management for Real-Time Critical Infrastructure Protection., , , , , , , and . MILCOM, page 248-253. IEEE, (2013)