From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic threat classification using multiclass SVM from audio signals., и . ETFA, стр. 1-6. IEEE, (2012)Application of New ATAM Tools to Evaluation of the Dynamic Map Architecture., , , и . MCSS, том 368 из Communications in Computer and Information Science, стр. 248-261. Springer, (2013)IOEM - Ontology Engineering Methodology for Large Systems., , , , и . ICCCI (1), том 6922 из Lecture Notes in Computer Science, стр. 602-611. Springer, (2011)OASIS Archive - Open Archiving System with Internet Sharing., , , , , , и . FMN, том 5630 из Lecture Notes in Computer Science, стр. 254-259. Springer, (2009)The Self-Similarity of Bandwidth Estimation-based Transport Protocol., и . EuroIMSA, стр. 169-173. IASTED/ACTA Press, (2005)Automated qualitative assessment of multi-modal distortions in digital images based on GLZ., , , , , , и . Ann. des Télécommunications, 65 (1-2): 3-17 (2010)Visual detection of knives in security applications using Active Appearance Models., , и . Multimedia Tools Appl., 74 (12): 4253-4267 (2015)Supporting QoS in Integrated Ad-Hoc Networks., , , , , и . Wireless Personal Communications, 56 (2): 183-206 (2011)Towards Robust Visual Knife Detection in Images: Active Appearance Models Initialised with Shape-Specific Interest Points., , и . MCSS, том 287 из Communications in Computer and Information Science, стр. 148-158. Springer, (2012)Implementation of Digital Watermarking Algorithms in Parallel Hardware Accelerators., и . Int. J. Parallel Program., 45 (5): 1108-1127 (2017)