Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information theory.. Cambridge University Press, (1997)Transformation of a general 3D facial model to an actual scene face., , and . ICPR (3), page 75-78. IEEE, (1992)Robust Labeling Methods for Copy Protection of Images., , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 3022 of SPIE Proceedings, page 298-309. SPIE, (1997)KEYMEX: An expert system for the design of key management schemes., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 96-103. Springer, (1990)Some aspects of error bounds in feature selection., and . Pattern Recognit., 11 (5-6): 353-360 (1979)Weaknesses in Two Recent Lightweight RFID Authentication Protocols., , , , and . Inscrypt, volume 6151 of Lecture Notes in Computer Science, page 383-392. Springer, (2009)A Novel Approach for Noise Reduction in the Gabor Time-frequency Domain., and . VISAPP (2), page 22-27. INSTICC Press, (2009)978-989-8111-69-2.Information theoretical approach to mobile code., and . ISIT, page 1226-1230. IEEE, (2005)A comprehensive RFID solution to enhance inpatient medication safety., , , and . Int. J. Medical Informatics, 80 (1): 13-24 (2011)Feature Selection for Paintings Classification by Optimal Tree Pruning., , and . MRCS, volume 4105 of Lecture Notes in Computer Science, page 354-361. Springer, (2006)