Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizations of k-comma codes and k-comma intercodes., , and . Acta Inf., 53 (1): 23-33 (2016)A first step in characterizing three-element codes., , and . Acta Inf., 55 (5): 445-457 (2018)A probabilistic Demons algorithm for texture-rich image registration., and . ICIP, page 161-164. IEEE, (2009)A free monoid containing all strongly Bi-singular languages and non-primitive words., , and . Int. J. Comput. Math. Comput. Syst. Theory, 4 (1): 57-66 (2019)Architecture-agnostic Iterative Black-box Certified Defense against Adversarial Patches., , , , , , and . CoRR, (2023)A Homogeneous Colorimetric Strategy Based on Rose-like CuS@Prussian Blue/Pt for Detection of Dopamine., , , , and . Sensors, 23 (22): 9029 (November 2023)Reach-Avoid Games with a Time Limit and Detection Range: A Geometric Approach., , , , and . Complex., (2022)Towards Automating Precision Studies of Clone Detectors., , , , , , , and . CoRR, (2018)PPMS: A Peer to Peer Metadata Management Strategy for Distributed File Systems., , , , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 435-445. Springer, (2014)A Functional Approach for Analyzing Time-Dependent Driver Response Behavior to Real-World Connected Vehicle Warnings., , , and . IEEE Trans. Intell. Transp. Syst., 24 (3): 3438-3447 (March 2023)