Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malware Target Recognition of Unknown Threats., , , , and . IEEE Syst. J., 7 (3): 467-477 (2013)The complex cepstrum applied to two-dimensional images., , , , and . Pattern Recognit., 26 (10): 1579-1592 (1993)Performance analysis of a new computer aided detection system for identifying lung nodules on chest radiographs., , , and . Medical Image Anal., 12 (3): 240-258 (2008)Multisensor fusion classification with a multilayer perceptron., , , and . IJCNN, page 863-868. IEEE, (1990)Narratives as a Fundamental Component of Consciousness., , , , and . CMN, volume 41 of OASIcs, page 246-250. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2014)Neural networks for automatic target recognition., , , , , , , , and . Neural Networks, 8 (7-8): 1153-1184 (1995)MLP iterative construction algorithm., , , and . Neurocomputing, 17 (3-4): 195-216 (1997)Alert Verification Evasion Through Server Response Forging., , , , and . RAID, volume 4637 of Lecture Notes in Computer Science, page 256-275. Springer, (2007)QuEST for Information Fusion in Multimedia Reports., , , , , and . Int. J. Monit. Surveillance Technol. Res., 2 (3): 1-30 (2014)Digital production of color Mach bands using a color human visual system model., , and . IEEE Trans. Syst. Man Cybern. Part A, 28 (1): 127-130 (1998)