Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling long-range dependencies in speech data for text-independent speaker recognition., and . ICASSP, page 4825-4828. IEEE, (2008)Global Workspace and Direct Cortex Access: An Astral Framework for Consciousness., , and . IC-AI, page 521-524. CSREA Press, (2004)Energy harvesting from human motion for wearable devices., , , , and . NEMS, page 409-412. IEEE, (2015)K2 and K 2 * : efficient alignment-free sequence similarity measurement based on Kendall statistics., , , and . Bioinform., 34 (10): 1682-1689 (2018)Availability Analysis Method of Multilevel Security Models with Credibility Characteristics, , , and . Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, 1, page 175-178. (April 2009)Research on OCR Post-processing Applications for Handwritten Recognition Based on Analysis of Scientific Materials., , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 131-135. Springer, (2011)Acceleration of Naive-Bayes algorithm on multicore processor for massive text classification., , , , , , , and . ISIC, page 344-347. IEEE, (2014)Optimal Merchandise Selection Strategy in E-Store Promotional Webpage: A TOPSIS based Approach., and . J. Electron. Commer. Organ., 14 (2): 1-15 (2016)Group Invariant Deep Representations for Image Instance Retrieval., , , , , and . AAAI Spring Symposia, AAAI Press, (2017)Tiny Descriptors for Image Retrieval with Unsupervised Triplet Hashing., , , , and . CoRR, (2015)