Author of the publication

Large-Scale Image Retrieval Using Local Binary Patterns and Iterative Quantization.

, , and . DICTA, page 1-5. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facial image reconstruction using polygon approximation., , , , and . SIP, page 565-569. IASTED/ACTA Press, (2005)Swarm Intelligent Compressive Routing in Wireless Sensor Networks., , and . Comput. Intell., 31 (3): 513-531 (2015)Identify Website Personality by Using Unsupervised Learning Based on Quantitative Website Elements., , and . ICONIP (1), volume 9489 of Lecture Notes in Computer Science, page 522-530. Springer, (2015)Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition., , , and . PST, page 1-2. IEEE Computer Society, (2018)GRAFIX: Automated Rule-Based Post Editing System to Improve English-Persian SMT Output., , and . COLING (Posters), page 873-882. Indian Institute of Technology Bombay, (2012)COR-Honeypot: Copy-On-Risk, Virtual Machine as Honeypot in the Cloud., , , , and . CLOUD, page 908-912. IEEE Computer Society, (2016)A federated network online network traffics analysis engine for cybersecurity., , , , and . IJCNN, page 1-8. IEEE, (2015)A self-organization mechanism based on cross-entropy method for P2P-like applications., , , and . ACM Trans. Auton. Adapt. Syst., 5 (4): 15:1-15:31 (2010)A Fast Real-Time Skin Detector for Video Sequences., and . ICIAR, volume 3656 of Lecture Notes in Computer Science, page 804-811. Springer, (2005)Free and open source intrusion detection systems: A study., , and . ICMLC, page 205-210. IEEE, (2015)