Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometric Recognition: Security and Privacy Concerns, , and . IEEE Security & Privacy, 1 (2): 33-42 (2003)Enhanced rail component detection and consolidation for rail track inspection., , , , and . WACV, page 289-295. IEEE Computer Society, (2012)An Extensible Language Interfacefor Robot Manipulation., , , , and . AGI, volume 7716 of Lecture Notes in Computer Science, page 21-30. Springer, (2012)Fingerprint enhancement., , , and . WACV, page 202-207. IEEE Computer Society, (1996)Evaluation Techniques for Biometrics-Based Authentication Systems (FRR)., , and . ICPR, page 2831-2837. IEEE Computer Society, (2000)Minutia Verification and Classification for Fingerprint Matching., , , , and . ICPR, page 1025-1029. IEEE Computer Society, (2000)Real-Time Traffic Sign Detection: An Evaluation Study., , and . ICPR, page 3033-3036. IEEE Computer Society, (2010)An Evaluation of Error Confidence Interval Estimation Methods., , and . ICPR (3), page 103-106. IEEE Computer Society, (2004)Accurate coverage summarization of UAV videos., , and . AIPR, page 1-5. IEEE Computer Society, (2014)Automated Medical Image Modality Recognition by Fusion of Visual and Text Information., , , , and . MICCAI (2), volume 8674 of Lecture Notes in Computer Science, page 487-495. Springer, (2014)