Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber Security & Ethical Hacking For SMEs., and . KMO, page 12. ACM, (2016)Azithromycin blocks autophagy and may predispose cystic fibrosis patients to mycobacterial infection., , , , , , , , , and 11 other author(s). J Clin Invest, 121 (9): 3554--3563 (September 2011)Use of Computer Vision for White Line Detection for Robotic Applications., , and . EIT, page 509-514. IEEE, (2019)Modular elliptic curves over the field of twelfth roots of unity.. LMS J. Comput. Math., 19 (1): 155-174 (2016)XaaS: Acceleration as a Service to Enable Productive High-Performance Cloud Computing., , , , , , , , , and 1 other author(s). CoRR, (2024)Achieving eye contact in a one-to-many 3D video teleconferencing system., , , , , , , and . ACM Trans. Graph., 28 (3): 64 (2009)Smart-frame: A flexible, scalable, and secure information management framework for smart grids., , , , and . ICITST, page 668-673. IEEE, (2012)Forensics data acquisition methods for mobile phones., , and . ICITST, page 265-269. IEEE, (2012)Creating near-field VR using stop motion characters and a touch of light-field rendering., , , , , , , , , and 4 other author(s). SIGGRAPH Posters, page 19:1. ACM, (2015)A cell phone based platform for facial performance capture., , , , , , and . SIGGRAPH Posters, page 35. ACM, (2012)