Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved feature matching algorithm with low memory requirement., , , and . CISP-BMEI, page 270-274. IEEE, (2016)Computing minimum cuts in hypergraphs., and . CoRR, (2016)Fast and Efficient Basis Selection Methods for Embedded Wavelet Packet Image Coding., and . ICIAR (1), volume 4141 of Lecture Notes in Computer Science, page 480-492. Springer, (2006)Demo: Finger and Hand Gesture Recognition using Smartwatch., , , and . MobiSys, page 471. ACM, (2015)Indexing billions of images for sketch-based retrieval., , , and . ACM Multimedia, page 233-242. ACM, (2013)Privacy Protection Workflow Publishing Under Differential Privacy., , , , and . WISA, volume 11817 of Lecture Notes in Computer Science, page 382-394. Springer, (2019)Linear Cryptanalysis of FASER128/256 and TriviA-ck., , and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 237-254. Springer, (2014)Compressive Channel Estimation in Space Domain for Massive MIMO Systems., and . VTC Fall, page 1-5. IEEE, (2015)Remodeling and Simulation of Intrusion Detection Evaluation Dataset., , and . Security and Management, page 245-251. CSREA Press, (2006)A Nonconforming Characteristic Finite Element Method for Nonlinear Advection-Dominated Diffusion Equation with Memory Term., , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 179-187. Springer, (2013)