Author of the publication

Image forgery detection using Markov features in undecimated wavelet transform.

, and . IC3, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of Job Allocation Strategies on Communication-Driven Coscheduling in Clusters., , , , and . Euro-Par, volume 2790 of Lecture Notes in Computer Science, page 160-168. Springer, (2003)Scalable K-Medoids via True Error Bound and Familywise Bandits., , , and . CoRR, (2019)Bagpipe: Accelerating Deep Recommendation Model Training., , , and . SOSP, page 348-363. ACM, (2023)Pufferfish: Communication-efficient Models At No Extra Cost., , and . MLSys, mlsys.org, (2021)Regularized Graph Convolutional Networks for Short Text Classification., , , , , and . COLING (Industry), page 236-242. International Committee on Computational Linguistics, (2020)Monitoring optical modulation amplitude using a low-power CMOS circuit for thermal control of Si ring transmitters., , , , , , and . ECOC, page 1-3. IEEE, (2014)The Impact of Noise on the Scaling of Collectives: A Theoretical Approach., , and . HiPC, volume 3769 of Lecture Notes in Computer Science, page 280-289. Springer, (2005)Adaptive incremental checkpointing for massively parallel systems., , , and . ICS, page 277-286. ACM, (2004)Co-Ordinated Coscheduling in Time-Sharing Clusters through a Generic Framework., , , , and . CLUSTER, page 84-91. IEEE Computer Society, (2003)Image forgery detection using Markov features in undecimated wavelet transform., and . IC3, page 1-6. IEEE Computer Society, (2016)