Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finding any Waldo: zero-shot invariant and efficient visual search., , , , , and . CoRR, (2018)Applying Genetic Algorithms and Other Heuristic Methods to Handle PC Configuration Problems., and . International Conference on Computational Science (2), volume 2074 of Lecture Notes in Computer Science, page 439-446. Springer, (2001)Optimizing Personal Computer Configurations with Heuristic-Based Search Methods., and . Artif. Intell. Rev., 17 (2): 129-140 (2002)An Adaptive Framework of Multiple Schemes for Event and Query Distribution in Wireless Sensor Networks., , and . CCNC, page 182-186. IEEE, (2007)Multi-layer linear model for top-down modulation of visual attention in natural egocentric vision., , , , , and . ICIP, page 3470-3474. IEEE, (2017)A talking profile to distinguish identical twins., , , , , and . Image Vis. Comput., 32 (10): 771-778 (2014)Label-Guided Knowledge Distillation for Continual Semantic Segmentation on 2D Images and 3D Point Clouds., , , , , , , , and . ICCV, page 18555-18566. IEEE, (2023)Dual-Perspective Knowledge Enrichment for Semi-supervised 3D Object Detection., , , , and . AAAI, page 2049-2057. AAAI Press, (2024)TEVAD: Improved video anomaly detection with captions., , , , and . CVPR Workshops, page 5549-5559. IEEE, (2023)Using heuristic-based optimizers to handle the personal computer configuration problems., and . ICTAI, page 108-. IEEE Computer Society, (2000)