Author of the publication

A CBR System for Efficient Face Recognition Under Partial Occlusion.

, , and . ICCBR, volume 10339 of Lecture Notes in Computer Science, page 170-184. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inhibition of Occluded Facial Regions for Distance-Based Face Recognition., , and . IJCAI, page 5324-5328. ijcai.org, (2018)Marco de Referencia para la Gestión de la Calidad de las Especificaciones de Requisitos., , , , and . QUATIC, volume 1284 of CEUR Workshop Proceedings, page 207-213. CEUR-WS.org, (2001)Neural Networks Applied to Fingerprint Recognition., , , , and . IWANN (2), volume 5518 of Lecture Notes in Computer Science, page 621-625. Springer, (2009)A Solution CBR Agent-Based to Classify SOAP Message within SOA Environments., , , , and . HAIS, volume 5572 of Lecture Notes in Computer Science, page 492-499. Springer, (2009)MACSDE: Multi-Agent Contingency Response System for Dynamic Environments., , , , and . HAIS, volume 5572 of Lecture Notes in Computer Science, page 50-59. Springer, (2009)MASPI: A Multi Agent System for Prediction in Industry 4.0 Environment., , , and . SOCO-CISIS-ICEUTE, volume 771 of Advances in Intelligent Systems and Computing, page 197-206. Springer, (2018)Threat Detection in URLs by Applying Machine Learning Algorithms*., , and . DCAI (2), volume 585 of Lecture Notes in Networks and Systems, page 191-196. Springer, (2022)Textile Engineering and Case Based Reasoning., , , and . DCAI, volume 474 of Advances in Intelligent Systems and Computing, page 423-431. Springer, (2016)A Security Proposal Based on a Real Time Agent to Protect Web Services Against DoS Attack., , , and . SOCO, volume 73 of Advances in Intelligent and Soft Computing, page 1-8. Springer, (2010)Two-step verification as a safety measure for learners and teachers: an attempt to implement it in a real environment (short paper)., , , , , , and . CINAIC, volume 3129 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)