Author of the publication

On the fast shape recovery technique using multiple ring lights.

, , and . Pattern Recognit., 30 (6): 883-893 (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Mining-Based Ethereum Fraud Detection., , , and . Blockchain, page 266-273. IEEE, (2019)Load-Balanced and Sybil-Resilient File Search in P2P Networks., , and . OPODIS, volume 5401 of Lecture Notes in Computer Science, page 542-545. Springer, (2008)Stabilizing Certificate Dispersal., and . Self-Stabilizing Systems, volume 3764 of Lecture Notes in Computer Science, page 140-152. Springer, (2005)Optimal Dispersal of Certificate Chains., , and . IEEE Trans. Parallel Distributed Syst., 18 (4): 474-484 (2007)Optimal dispersal of special certificate graphs., , and . GLOBECOM, page 2213-2217. IEEE, (2004)Key bundles and parcels: Secure communication in many groups., , and . Comput. Networks, 50 (11): 1781-1798 (2006)B-APT: Bayesian Anti-Phishing Toolbar., , , , and . ICC, page 1745-1749. IEEE, (2008)Changing young women's perceptions of CS via outreach., and . ITiCSE, page 333. ACM, (2013)Rating Certificates., and . ICCCN, page 449-454. IEEE, (2006)Vulnerability analysis of certificate graphs., and . Int. J. Secur. Networks, 1 (1/2): 13-23 (2006)