Author of the publication

Photoplethysmographic Subject Identification by Considering Feature Values Derived from Heartbeat and Respiration.

, , , , and . EMBC, page 902-905. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Super-Resolved Video Mosaicing for Documents Based on Extrinsic Camera Parameter Estimation., , , , , and . ACCV (2), volume 3852 of Lecture Notes in Computer Science, page 101-110. Springer, (2006)Panoramic Movie Generation Using an Omnidirectional Multi-camera System for Telepresence., , and . SCIA, volume 2749 of Lecture Notes in Computer Science, page 1074-1081. Springer, (2003)Super-resolved Video Mosaicing for Documents by extrinsic Camera parameter estimation., , , , , and . ICCVG, volume 32 of Computational Imaging and Vision, page 327-336. Springer, (2004)Web-Based Telepresence System Using Omni-directional Video Streams., , , , , , , and . PCM (3), volume 3333 of Lecture Notes in Computer Science, page 45-52. Springer, (2004)Construction of Feature Landmark Database Using Omnidirectional Videos and GPS Positions., , , and . 3DIM, page 249-256. IEEE Computer Society, (2007)Background Image Registration as a Post-Processing Technique in Diminished Reality Rendering Procedures., , , , , and . ISMAR Adjunct, page 200-201. IEEE Computer Society, (2017)Workshop on Highly Diverse Cameras and Displays for Mixed and Augmented Reality (HDCD4MAR) Summary., , and . ISMAR Adjunct, page 326. IEEE Computer Society, (2017)Procams-Based Cybernetics., , , and . CoRR, (2015)Selective Voltage Application to Connected Loads Using Soft Matter Computer Based on Conductive Droplet Interval Design., , , , , and . IEEE Robotics Autom. Lett., 8 (3): 1747-1754 (March 2023)Attack on PPG Biometrics: Presentation Attack by Stealth Recording and Waveform Estimation., , , , and . EMBC, page 64-67. IEEE, (2021)