Author of the publication

A Method for Identification of Students' States Using Kinect.

, , , and . IMCOM, volume 935 of Advances in Intelligent Systems and Computing, page 341-350. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Traffic Reduction for Mobile Agent Migration., , , and . ICAART (2), page 351-354. SciTePress, (2012)Shape refinement and rigging of raw-scanned 3D volume by a user-specified skeleton., , , and . Comput. Graph., (2020)Assignment strategy selection for multi-car elevator group control using reinforcement learning., and . Int. J. Knowl. Web Intell., 3 (2): 163-179 (2012)Polynomial Time Matching Algorithms for Tree-Like Structured Patterns in Knowledge Discovery., , , , and . PAKDD, volume 1805 of Lecture Notes in Computer Science, page 5-16. Springer, (2000)Extraction of Tag Tree Patterns with Contractible Variables from Irregular Semistructured Data., , , , , , and . PAKDD, volume 2637 of Lecture Notes in Computer Science, page 430-436. Springer, (2003)Discovery of Frequent Tree Structured Patterns in Semistructured Web Documents., , , , and . PAKDD, volume 2035 of Lecture Notes in Computer Science, page 47-52. Springer, (2001)Discovery of Frequent Tag Tree Patterns in Semistructured Web Documents., , , , , and . PAKDD, volume 2336 of Lecture Notes in Computer Science, page 341-355. Springer, (2002)Debugging Mobile Agent Systems., , , , , and . iiWAS, page 667. ACM, (2013)A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability., , and . EUC Workshops, volume 3823 of Lecture Notes in Computer Science, page 433-442. Springer, (2005)Improvement of Detection for Warning Students in E-learning Using Web Cameras., and . KES, volume 35 of Procedia Computer Science, page 747-756. Elsevier, (2014)