Author of the publication

The Seventh Visual Object Tracking VOT2019 Challenge Results.

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and . ICCV Workshops, page 2206-2241. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Throughput Performance of 2×2 Mimo LTE Downlink in a Spatial Correlation Based Microcellular Channel for Wireless Broadband Networks., and . CoRR, (2011)Forensics Analysis of Sandboxie Artifacts., and . SSCC, volume 377 of Communications in Computer and Information Science, page 341-352. Springer, (2013)Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes., and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 247-251. Springer, (2013)A Deep Neural Network based Approach for Entity Extraction in Code-Mixed Indian Social Media Text., , and . LREC, European Language Resources Association (ELRA), (2018)Special Section on Computational Methods in Neuroscience - Challenges and Future Trends., , and . Comput. Electr. Eng., (2019)A Two-Stage Metaheuristic Algorithm for the Dynamic Vehicle Routing Problem in Industry 4.0 approach., , and . CoRR, (2020)Big Data Framework for Zero-Day Malware Detection., and . Cybern. Syst., 49 (2): 103-121 (2018)Editorial., and . Neural Comput. Appl., 32 (3): 603-605 (2020)Sound Classification Using Convolutional Neural Network and Tensor Deep Stacking Network., , , , , and . IEEE Access, (2019)Local Mutual Exclusion algorithm using fuzzy logic for Flying Ad hoc Networks., , , , and . Comput. Commun., (2020)