Author of the publication

Statistically-constrained shallow text marking: techniques, evaluation paradigm and results.

, and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050Z. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The syntax of concealment: reliable methods for plain text information hiding., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050Y. SPIE, (2007)Modelling the Yield of Number Field Sieve Polynominals.. ANTS, volume 1423 of Lecture Notes in Computer Science, page 137-150. Springer, (1998)Strudel: A Corpus-Based Semantic Model Based on Properties and Types., , , and . Cogn. Sci., 34 (2): 222-254 (2010)Additive preconditioning and aggregation in matrix computations., , , , , , and . Comput. Math. Appl., 55 (8): 1870-1886 (2008)Schur aggregation for linear systems and determinants., , , , , and . Theor. Comput. Sci., 409 (2): 255-268 (2008)Computer supported collaborative learning through reflection on practice.. Oxford Brookes University, UK, (2001)British Library, EThOS.Foreign Disinformation in America and the U.S. Government's Ethical Obligations to Respond. Lecture Notes in Social Networks Springer, (2023)An LPV approach to synthesizing robust active vision systems., , and . CDC, page 2545-2550. IEEE, (2000)Selecting Corpus-Semantic Models for Neurolinguistic Decoding., , and . *SEM@NAACL-HLT, page 114-123. Association for Computational Linguistics, (2012)The schur aggregation for solving linear systems of equations., , , and . SNC, page 142-151. ACM, (2007)