Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Should We Prove Security Policies Correct?, , and . EGCDMAS, page 56-65. INSTICC Press, (2004)Generalised Gradient Vector Flow for Content-Aware Image Resizing., , and . ICIAP (2), volume 11752 of Lecture Notes in Computer Science, page 260-270. Springer, (2019)Towards an Efficient Facial Image Compression with Neural Networks., , and . ICIAP (1), volume 13231 of Lecture Notes in Computer Science, page 512-523. Springer, (2022)An Explainable Medical Imaging Framework for Modality Classifications Trained Using Small Datasets., , and . ICIAP (1), volume 13231 of Lecture Notes in Computer Science, page 358-367. Springer, (2022)Natural Gas Leakage Detection: a Deep Learning Framework on IR Video Data., , , , and . ICPR, page 636-642. IEEE, (2022)Pollen Grain Classification Challenge 2020 - Challenge Report., , , , , , , and . ICPR Workshops (8), volume 12668 of Lecture Notes in Computer Science, page 469-479. Springer, (2020)A light viewfinder pipeline for consumer devices application., , , and . ICME, page 681-684. IEEE Computer Society, (2003)Compressed SVG Representation of Raster Images Vectorized by DDT Triangulation., , and . Eurographics Italian Chapter Conference, page 233-239. Eurographics, (2006)A Survey of Digital Mosaic Techniques., , , and . Eurographics Italian Chapter Conference, page 129-135. Eurographics, (2006)Random-temporal block selection for video stabilization., , and . Digital Photography, volume 7876 of SPIE Proceedings, page 78760K. SPIE/IS&T, (2011)