Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Self-Similarity of Bandwidth Estimation-based Transport Protocol., and . EuroIMSA, page 169-173. IASTED/ACTA Press, (2005)Visual detection of knives in security applications using Active Appearance Models., , and . Multimedia Tools Appl., 74 (12): 4253-4267 (2015)Automated qualitative assessment of multi-modal distortions in digital images based on GLZ., , , , , , and . Ann. des Télécommunications, 65 (1-2): 3-17 (2010)Application of New ATAM Tools to Evaluation of the Dynamic Map Architecture., , , and . MCSS, volume 368 of Communications in Computer and Information Science, page 248-261. Springer, (2013)Automatic threat classification using multiclass SVM from audio signals., and . ETFA, page 1-6. IEEE, (2012)IOEM - Ontology Engineering Methodology for Large Systems., , , , and . ICCCI (1), volume 6922 of Lecture Notes in Computer Science, page 602-611. Springer, (2011)OASIS Archive - Open Archiving System with Internet Sharing., , , , , , and . FMN, volume 5630 of Lecture Notes in Computer Science, page 254-259. Springer, (2009)On TCP Westwood Bandwidth Estimation with Reordered Segments.. EuroIMSA, page 174-178. IASTED/ACTA Press, (2005)Supporting QoS in Integrated Ad-Hoc Networks., , , , , and . Wireless Personal Communications, 56 (2): 183-206 (2011)Implementation of Digital Watermarking Algorithms in Parallel Hardware Accelerators., and . Int. J. Parallel Program., 45 (5): 1108-1127 (2017)