Author of the publication

Detection of Shape Anomalies: A Probabilistic Approach Using Hidden Markov Models.

, , , and . ICDE, page 1325-1327. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

License Management Scheme for Learning Resources Delivery in P2P Networks., , , , and . PDPTA, page 212-220. CSREA Press, (2006)Improved FFSBM Algorithm and Its VLSI Architecture for AVS Video Standard., , and . J. Comput. Sci. Technol., 21 (3): 378-382 (2006)Network Performance Optimization in Constrained Queueing Systems., , and . Wireless Personal Communications, 72 (2): 1023-1042 (2013)Sample Path Sharing in Policy Improvement for Indoor Air Temperature Control., and . WODES, page 247-252. International Federation of Automatic Control, (2014)PRTAD: A database for protein residue torsion angle distributions., , , and . IJDMB, 3 (4): 469-482 (2009)Multi-objective optimization: A method for selecting the optimal solution from Pareto non-inferior solutions., , , and . Expert Syst. Appl., (2017)A high-throughput LDPC decoder for optical communication., , , , , and . ASICON, page 1-4. IEEE, (2013)Minimum Entropy-Based Cascade Control for Governing Hydroelectric Turbines., , , and . Entropy, 16 (6): 3136-3148 (2014)Strategy for assessment of disaster risk using typhoon hazards modeling based on chlorophyll-a content of seawater., , , , and . EURASIP J. Wireless Comm. and Networking, (2018)Entropies of the Chinese Land Use/Cover Change from 1990 to 2010 at a County Level., , , , , , and . Entropy, 19 (2): 51 (2017)