Author of the publication

Use of Computer Vision for White Line Detection for Robotic Applications.

, , and . EIT, page 509-514. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An automultiscopic projector array for interactive digital humans., , , , , , , , and . SIGGRAPH Emerging Technologies, page 6:1. ACM, (2015)Driving high-resolution facial blendshapes with video performance capture., , , , , , , and . SIGGRAPH Talks, page 33:1. ACM, (2013)A Distributed Snapshot Framework for Digital Forensics Evidence Extraction and Event Reconstruction from Cloud Environment., , and . CloudCom (1), page 699-704. IEEE Computer Society, (2013)Facial performance synthesis using deformation-driven polynomial displacement maps., , , , , , , , and . ACM Trans. Graph., 27 (5): 121 (2008)Killing Your Device via Your USB Port., , , and . HAISA, page 61-72. University of Plymouth, (2019)Digital Reunification of the Parthenon and its Sculptures., , , , , , , and . VAST, page 41-50. Eurographics Association, (2003)Greening Growth: How Local Government can Build the Green Environment. Local Government Information Unit, (2007)Application-Infrastructure Co-Programming: Managing the Entire Complex Application Lifecycle., , , , , , and . IWSG, volume 2357 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Mitigation of spear phishing attacks: A Content-based Authorship Identification framework., , and . ICITST, page 416-421. IEEE, (2011)RT-SANE: Real Time Security Aware Scheduling on the Network Edge., , , , and . UCC, page 131-140. ACM, (2017)