Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Suspicious Behavior Assessment for Visual Surveillance Using Neural Network Classifiers., , and . CISST, page 657-664. CSREA Press, (2003)Minimum-risk temporal alignment of videos., and . Multimedia Tools Appl., 77 (12): 14891-14906 (2018)An application of machine learning and statistics to defect detection., , , and . Intell. Data Anal., 5 (2): 151-164 (2001)An Embedding-Based Topic Model for Document Classification., , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 20 (3): 52:1-52:13 (2021)V-JAUNE: A Framework for Joint Action Recognition and Video Summarization., and . ACM Trans. Multim. Comput. Commun. Appl., 13 (2): 20:1-20:19 (2017)Learning Spatial Affordances From 3D Point Clouds for Mapping Unseen Human Actions in Indoor Environments., , , , , and . IEEE Access, (2024)Joint Action Segmentation and Classification by an Extended Hidden Markov Model., , , and . IEEE Signal Process. Lett., 20 (12): 1207-1210 (2013)Detection of Circular Objects by Wave Propagation on a Mesh-Connected Computer., , and . J. Parallel Distributed Comput., 31 (1): 77-87 (1995)Bi-modal emotion recognition from expressive face and body gestures., and . J. Netw. Comput. Appl., 30 (4): 1334-1345 (2007)A Generative Adversarial Attack for Multilingual Text Classifiers., , , and . CoRR, (2024)