Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iSpy: automatic reconstruction of typed input from compromising reflections., , , , and . ACM Conference on Computer and Communications Security, page 527-536. ACM, (2011)Efficient and Scalable Depthmap Fusion., , , and . BMVC, page 1-12. BMVA Press, (2012)Improved Resolution Scalability for Bilevel Image Data in JPEG2000., , and . IEEE Trans. Image Process., 18 (4): 774-782 (2009)Fast Organization of Large Photo Collections Using CUDA., , , and . ECCV Workshops (1), volume 6554 of Lecture Notes in Computer Science, page 463-476. Springer, (2010)USAC: A Universal Framework for Random Sample Consensus., , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 35 (8): 2022-2038 (2013)Fast robust reconstruction of large-scale environments., , , , , , and . CISS, page 1-6. IEEE, (2010)Exploiting uncertainty in random sample consensus., , and . ICCV, page 2074-2081. IEEE Computer Society, (2009)Modeling and Recognition of Landmark Image Collections Using Iconic Scene Graphs., , , and . Int. J. Comput. Vis., 95 (3): 213-239 (2011)Improved Geometric Verification for Large Scale Landmark Image Collections., , and . BMVC, page 1-11. BMVA Press, (2012)Improved Resolution Scalability for Bi-Level Image Data in JPEG2000., , and . DCC, page 203-212. IEEE Computer Society, (2007)