Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Face Recognition Across Pose and Illumination., , , and . Handbook of Face Recognition, Springer, (2011)Face Recognition in a Meeting Room., , and . FG, page 294-299. IEEE Computer Society, (2000)Concurrent Object Recognition and Segmentation by Graph Partitioning., , and . NIPS, page 1383-1390. MIT Press, (2002)Robust Automatic Human Identification Using Face, Mouth, and Acoustic Information., , , and . AMFG, volume 3723 of Lecture Notes in Computer Science, page 264-278. Springer, (2005)Face Recognition and Privacy in the Age of Augmented Reality., , and . J. Priv. Confidentiality, (2014)Security Issues and Recommendations for Online Social Networks, , , , , , , , , and 1 other author(s). ENISA Position Paper, (October 2007)List of threats & recommendations for SNS.Silhouette-Based Human Identification from Body Shape and Gait., , and . FGR, page 366-371. IEEE Computer Society, (2002)Multi-PIE., , , , and . FG, page 1-8. IEEE Computer Society, (2008)Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook., and . Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science, page 36-58. Springer, (2006)Face De-identification., , , , and . Protecting Privacy in Video Surveillance, Springer, (2009)