Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Line-Based Face Recognition under Varying Pose., and . IEEE Trans. Pattern Anal. Mach. Intell., 21 (10): 1081-1088 (1999)New Fast Algorithms for Error Rate-Based Stepwise Variable Selection in Discriminant Analysis., , and . SIAM J. Sci. Comput., 22 (3): 1036-1052 (2000)Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs., , , , and . IEEE Access, (2019)Multitransputer architecture for the low-level characterization of speech spectrograms., and . Microprocess. Microsystems, 14 (5): 267-275 (1990)Learning Semi-Structured Document Categorization Using Bounded-Length Spectrum Sub-Sequence Kernels.. Data Min. Knowl. Discov., 13 (3): 309-334 (2006)An Embedded Bayesian Network Hidden Markov Model for Digital Forensics., , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 459-465. Springer, (2006)Code Action Network for Binary Function Scope Identification., , , , , , , and . PAKDD (1), volume 12084 of Lecture Notes in Computer Science, page 712-725. Springer, (2020)Concurrent Simulation of Instruction Systolic Array Structures.. MASCOTS, page 38-43. The Society for Computer Simulation, (1993)Automated recognition of event scenarios for digital forensics., , , , and . SAC, page 293-300. ACM, (2006)Inducing complex spatial descriptions in two dimensional scenes., , and . PRICAI Workshops, volume 1359 of Lecture Notes in Computer Science, page 123-132. Springer, (1996)