Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Colorization Using Segmentation with Random Walk., , and . CAIP, volume 5702 of Lecture Notes in Computer Science, page 468-475. Springer, (2009)Pathways core: a data model for cross-repository services., , , , , and . JCDL, page 368. ACM, (2006)Using standards in digital library design & development., , and . JCDL, page 423. ACM, (2005)Face De-spoofing: Anti-spoofing via Noise Modeling., , and . ECCV (13), volume 11217 of Lecture Notes in Computer Science, page 297-315. Springer, (2018)Accelerating Genetic Algorithm for Solving Graph Coloring Problem Based on CUDA Architecture., , , and . BIC-TA, volume 472 of Communications in Computer and Information Science, page 578-584. Springer, (2014)Learning-based ballistic breech face impression image matching., , , and . BTAS, page 1-8. IEEE, (2015)Research and implementation of load balancing algorithm for mass mobile application detection task., , and . CCIS, page 57-61. IEEE, (2016)Cloud computing resource scheduling and leasing algorithm based on extreme price filter., , , and . IJRIS, 9 (3/4): 137-143 (2017)Feature Transfer Learning for Deep Face Recognition with Long-Tail Data., , , , and . CoRR, (2018)A vascular bifurcations detection method based on Transfer Learning model., , and . CISP-BMEI, page 412-416. IEEE, (2016)