Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic resource allocation of smart home workloads in the cloud., , and . CNSM, page 367-370. IEEE, (2016)3-D Curvilinear Structure Detection Filter Via Structure-Ball Analysis., and . IEEE Trans. Image Processing, 22 (7): 2849-2863 (2013)Processing of low quality document images: Issues and directions., and . EUSIPCO, page 1-5. IEEE, (2008)The Service-Bond Paradigm - Potentials for a Sustainable, ICT-enabled Future., , and . CoRR, (2015)NFV-Based Architecture for the Interworking Between WebRTC and IMS., , and . IEEE Trans. Network and Service Management, 15 (4): 1363-1377 (2018)Optimization of the SVM Kernels Using an Empirical Error Minimization Scheme., , and . SVM, volume 2388 of Lecture Notes in Computer Science, page 354-369. Springer, (2002)Information Retrieval Based on OCR Errors in Scanned Documents., , , and . CVPR Workshops, page 25. IEEE Computer Society, (2003)Forgery Detection in Hyperspectral Document Images using Graph Orthogonal Nonnegative Matrix Factorization., and . CVPR Workshops, page 2823-2831. Computer Vision Foundation / IEEE, (2020)A Privacy-Preserving Federated Learning for IoT Intrusion Detection System., , , , , and . CoDIT, page 351-356. IEEE, (2023)Adaptive Error-Correcting Output Codes., and . IJCAI, page 1932-1938. IJCAI/AAAI, (2013)