Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Properties of Discretized Convex Curves., and . IEEE Trans. Pattern Anal. Mach. Intell., 11 (2): 217-223 (1989)Double-step generation of ellipses., and . IEEE Computer Graphics and Applications, 9 (3): 56-69 (1989)Geometrically robust image watermarking using star patterns., and . SIP, page 37-41. IASTED/ACTA Press, (2007)An Introduction to Light Interaction with Plants., and . RITA, 9 (2): 187-202 (2002)Light-weight semantics and Bayesian Classification: A hybrid technique for dynamic Web Service discovery., , , and . IRI, page 121-125. IEEE Systems, Man, and Cybernetics Society, (2010)The axisymmetric Boussinesq-type problem for a half-space under optimal heating of arbitrary profile., , , and . Int. J. Math. Mathematical Sciences, 2004 (40): 2123-2131 (2004)Mining sequential patterns with extensible knowledge representation., , , and . Intell. Data Anal., 15 (6): 889-911 (2011)Formulas for the width of interval products., and . Reliab. Comput., 1 (1): 9-14 (1995)Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-Networks., , , , and . Counterterrorism and Open Source Intelligence, volume 2 of Lecture Notes in Social Networks, Springer, (2011)Optimal computation of the Bernstein algorithm for the bound of an interval polynomial.. Computing, 28 (3): 239-246 (1982)