Author of the publication

Towards an Automated Dental Identification System (ADIS).

, , , , , , , , , and . ICBA, volume 3072 of Lecture Notes in Computer Science, page 789-796. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated dental identification system (ADIS) in testing mode., , , , , and . DG.O, volume 228 of ACM International Conference Proceeding Series, page 250-251. Digital Government Research Center, (2007)Performance Analysis of Degradable Multiprocessor Systems using Time Scale Decomposition of GSPNs., and . ICDCS, page 545-553. IEEE Computer Society, (1988)Automated dental identification system (ADIS)., , and . DG.O, volume 228 of ACM International Conference Proceeding Series, page 248-249. Digital Government Research Center, (2007)webADIS: a flexible web-based environment for the Automated Dental Identification System., , , , , , , and . DG.O, volume 151 of ACM International Conference Proceeding Series, page 348-349. Digital Government Research Center, (2006)Towards an Automated Dental Identification System (ADIS)., , , , , , , , , and . ICBA, volume 3072 of Lecture Notes in Computer Science, page 789-796. Springer, (2004)Performability Analysis of Distributed Real-Time Systems with Repetitive Task Invocation., and . FTCS, page 352-359. IEEE Computer Society, (1991)Fast and Accurate Segmentation of Dental X-Ray Records., , , and . ICB, volume 3832 of Lecture Notes in Computer Science, page 688-696. Springer, (2006)Automatic Construction of Dental Charts for Postmortem Identification., , , and . IEEE Trans. Inf. Forensics Secur., 3 (2): 234-246 (2008)Assessing Enterprise Governance of Information Technology Maturity Models in Middle East and North Africa Region., , , and . FedCSIS (Position Papers), volume 26 of Annals of Computer Science and Information Systems, page 183-190. (2021)A Methodology For Risk Assessment Of Functional Specification Of Software Systems Using Colored Petri Nets., , and . IEEE METRICS, page 108-. IEEE Computer Society, (1997)