Author of the publication

AgED: Extraction and Evaluation of Elliptic Fourier Descriptors from Image Data in Phenotype Assessment Applications.

, and . BIOINFORMATICS, page 324-327. SciTePress, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Open-Source Community Resource for Creating, Collecting, Sharing and Applying Predictive Microbial Models (PMM-Lab)., , , , , and . Future Security, volume 318 of Communications in Computer and Information Science, page 462-465. Springer, (2012)AgED: Extraction and Evaluation of Elliptic Fourier Descriptors from Image Data in Phenotype Assessment Applications., and . BIOINFORMATICS, page 324-327. SciTePress, (2013)Cuneiform.. Humboldt University of Berlin, Germany, (2021)Portability of Scientific Workflows in NGS Data Analysis: A Case Study., , , , , , and . CoRR, (2020)Modeling Erlang processes as Petri nets., and . Erlang Workshop, page 61-66. ACM, (2018)Decision-Support System for Urban Air Pollution under Future Climate Conditions., , , , , and . ISESS, volume 359 of IFIP Advances in Information and Communication Technology, page 641-650. Springer, (2011)Testing the accuracy of a data assimilation algorithm., and . Int. J. Comput. Sci. Eng., 3 (4): 305-313 (2007)Anonymous and Verifiable Registration in Databases., , and . EUROCRYPT, volume 330 of Lecture Notes in Computer Science, page 167-176. Springer, (1988)Numerical modelling of transport, dispersion, and deposition - validation against ETEX-1, ETEX-2 and Chernobyl., , , and . Environ. Model. Softw., 15 (6-7): 521-531 (2000)Zero-Knowledge Authentication Scheme with Secret Key Exchange., , , and . J. Cryptol., 11 (3): 147-159 (1998)