Author of the publication

On-The-Fly Handwriting Recognition using a High-Level Representation

, , , , , , and . The 16th International Conference on Computer Analysis of Images and Patterns (CAIP), Lecture Notes in Computer Science (LNCS), (September 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recommender Systems on Homomorphically Encrypted Databases for Enhanced User Privacy., , , and . LCN Symposium, page 74-82. IEEE, (2019)Mapping the Interplanetary Filesystem., , , and . Networking, page 289-297. IEEE, (2020)Anonymous Datagrams over DNS Records., , , and . LCN, page 536-544. IEEE, (2018)VANET Convenience and Efficiency Applications., and . VANET, Wiley, (2010)Parameter Prioritization for Efficient Transmission of Neural Networks in Small Satellite Applications., , , and . MedComNet, page 39-42. IEEE, (2023)Monetary Stabilization in Cryptocurrencies - Design Approaches and Open Questions., , , , , and . CVCBT, page 47-59. IEEE, (2019)Unleashing Tor, BitTorrent & Co.: How to relieve TCP deficiencies in overlays., , and . LCN, page 320-323. IEEE Computer Society, (2010)BottleMod: Modeling Data Flows and Tasks for Fast Bottleneck Analysis., , , and . IEEE Big Data, page 6769-6771. IEEE, (2022)On-The-Fly Handwriting Recognition using a High-Level Representation, , , , , , and . The 16th International Conference on Computer Analysis of Images and Patterns (CAIP), Lecture Notes in Computer Science (LNCS), (September 2015)Together We are Strong: Securing Industrial Wireless Networks with Overhearing Nodes., , , and . LCN, page 259-262. IEEE, (2018)