Author of the publication

Learning personalized video highlights from detailed MPEG-7 metadata.

, , , and . ICIP (1), page 133-136. IEEE, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning personalized video highlights from detailed MPEG-7 metadata., , , and . ICIP (1), page 133-136. IEEE, (2002)Content Aware Source Code Change Description Generation., , , , and . INLG, page 119-128. Association for Computational Linguistics, (2018)Validating Security Policy Conformance with WS-Security Requirements., and . IWSEC, volume 6434 of Lecture Notes in Computer Science, page 133-148. Springer, (2010)Villani at SemEval-2018 Task 8: Semantic Extraction from Cybersecurity Reports using Representation Learning., , , and . SemEval@NAACL-HLT, page 885-889. Association for Computational Linguistics, (2018)Static vs. Dynamic Validation of BSP Conformance., , , , , and . ICWS, page 919-927. IEEE Computer Society, (2009)Generic Security Policy Transformation Framework for WS-Security., and . ICWS, page 513-520. IEEE Computer Society, (2007)Adaptable Privacy-Preserving Data Curation for Business Process Analysis Services., , and . SCC, page 411-418. IEEE Computer Society, (2016)Single Sign On Architecture with Dynamic Tokens., and . SAINT, page 197-200. IEEE Computer Society, (2004)Multi-factor-based Motion Detection for Server Rack Doors Left Open., , and . SCC, page 457-459. IEEE, (2020)Automating Domain Squatting Detection Using Representation Learning., , , , and . IEEE BigData, page 1021-1030. IEEE, (2020)