Author of the publication

Graph Matching - Challenges and Potential Solutions.

, , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 1-10. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Matching - Challenges and Potential Solutions., , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 1-10. Springer, (2005)Decision trees for filtering large databases of graphs., and . IJISTA, 3 (3/4): 166-187 (2007)Distance Measures for Image Segmentation Evaluation., , , and . EURASIP J. Adv. Signal Process., (2006)Graph Sequence Visualisation and its Application to Computer Network Monitoring and Abnormal Event Detection., , , , and . Applied Graph Theory in Computer Vision and Pattern Recognition, volume 52 of Studies in Computational Intelligence, Springer, (2007)Computer Network Monitoring and Abnormal Event Detection Using Graph Matching and Multidimensional Scaling., , , , and . ICDM, volume 4065 of Lecture Notes in Computer Science, page 576-590. Springer, (2006)Graph Database Filtering Using Decision Trees., and . ICPR (3), page 383-388. IEEE Computer Society, (2004)Decision Tree Structures for Graph Database Filtering., and . SSPR/SPR, volume 3138 of Lecture Notes in Computer Science, page 66-75. Springer, (2004)Theoretical Analysis and Experimental Comparison of Graph Matching Algorithms for Database Filtering., and . GbRPR, volume 2726 of Lecture Notes in Computer Science, page 118-129. Springer, (2003)Recovery of missing information in graph sequences by means of reference pattern matching and decision tree learning., , , and . Pattern Recognit., 39 (4): 573-586 (2006)Image Segmentation Evaluation by Techniques of Comparing Clusterings., , , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 344-351. Springer, (2005)