Author of the publication

Parallel complexity of the medial axis computation.

, and . ICIP, page 105-108. IEEE Computer Society, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks., , and . IJDSN, (2013)Parallel Filter Estimation Maximisation Algorithm for Segmentation on a Lan of Workstation., , and . PPSC, page 68-69. (1995)Behavioral Intrusion Detection Indicators., , , and . SEC, volume 278 of IFIP, page 317-331. Springer, (2008)Hierarchical node replication attacks detection in wireless sensors networks., , and . PIMRC, page 82-86. IEEE, (2009)Scalable 2D Convex Hull and Triangulation Algorithms for Coarse Grained Multicomputers., , , and . J. Parallel Distributed Comput., 56 (1): 47-70 (1999)An efficient algorithm for solving the token distribution problem on k-ary d-cube networks., , and . ISPAN, page 175-182. IEEE Computer Society, (1994)Comparing two Probabilistic Models of the Computational Complexity of the Branch and Bound Algorithm., , and . CONPAR, volume 854 of Lecture Notes in Computer Science, page 359-370. Springer, (1994)Computing the Medial Axis Transform in Parallel With Eight Scan Operations., and . IEEE Trans. Pattern Anal. Mach. Intell., 21 (3): 277-282 (1999)Centroid virtual coordinates - A novel near-shortest path routing paradigm., , , , and . Comput. Networks, 53 (10): 1697-1711 (2009)Pyramidal thinning algorithm for SIMD parallel machines.. Pattern Recognit., 28 (12): 1993-2000 (1995)