Author of the publication

Non-retrieval: Blocking Pornographic Images.

, , , and . CIVR, volume 2383 of Lecture Notes in Computer Science, page 50-60. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-retrieval: Blocking Pornographic Images., , , and . CIVR, volume 2383 of Lecture Notes in Computer Science, page 50-60. Springer, (2002)Using colour features to block dubious images., , and . EUSIPCO, page 1-4. IEEE, (2000)Active Open Learner Models as Animal Companions: Motivating Children to Learn through Interacting with My-Pet and Our-Pet., , , and . Int. J. Artif. Intell. Educ., 17 (2): 145-167 (2007)Pruning Depthwise Separable Convolutions for MobileNet Compression., , , and . IJCNN, page 1-8. IEEE, (2020)Bandwidth enhancement of transimpedance amplifier by a capacitive-peaking design., and . IEEE J. Solid State Circuits, 34 (8): 1167-1170 (1999)Applying the genetic encoded conceptual graph to grouping learning., , , , , and . Expert Syst. Appl., 37 (6): 4103-4118 (2010)Applying Learning Log Explorer to Diagnoses of E-Learning., , and . IMSA, page 151-156. IASTED/ACTA Press, (2005)A Hybrid Congestion Control for TCP over High Speed Networks., and . ICGEC, page 530-533. IEEE, (2012)The Robust FlexRay Communication Network with Distributed Fault-Tolerant Mechanisms Applied in X-by-Wire System., , , , and . ICSSE, volume 276 of Frontiers in Artificial Intelligence and Applications, page 419-432. IOS Press, (2015)Using hybrid data mining and machine learning clustering analysis to predict the turnover rate for technology professionals., , , and . Expert Syst. Appl., 39 (10): 8844-8851 (2012)