Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Line-Based Face Recognition under Varying Pose., and . IEEE Trans. Pattern Anal. Mach. Intell., 21 (10): 1081-1088 (1999)Learning Semi-Structured Document Categorization Using Bounded-Length Spectrum Sub-Sequence Kernels.. Data Min. Knowl. Discov., 13 (3): 309-334 (2006)Multitransputer architecture for the low-level characterization of speech spectrograms., and . Microprocess. Microsystems, 14 (5): 267-275 (1990)Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs., , , , and . IEEE Access, (2019)New Fast Algorithms for Error Rate-Based Stepwise Variable Selection in Discriminant Analysis., , and . SIAM J. Sci. Comput., 22 (3): 1036-1052 (2000)An Embedded Bayesian Network Hidden Markov Model for Digital Forensics., , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 459-465. Springer, (2006)Code Action Network for Binary Function Scope Identification., , , , , , , and . PAKDD (1), volume 12084 of Lecture Notes in Computer Science, page 712-725. Springer, (2020)Feature Mining and Mapping of Collinear Data., , and . PAKDD, volume 1394 of Lecture Notes in Computer Science, page 322-335. Springer, (1998)Automated recognition of event scenarios for digital forensics., , , , and . SAC, page 293-300. ACM, (2006)Similarity Enrichment in Image Compression through Weighted Finite Automata., , and . COCOON, volume 1858 of Lecture Notes in Computer Science, page 447-456. Springer, (2000)