Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Morphologically Constrained GRFs: Applications to Texture Synthesis and Analysis., and . IEEE Trans. Pattern Anal. Mach. Intell., 21 (2): 99-113 (1999)EXIT chart based IRA code design for TDMR., , , and . CISS, page 614-619. IEEE, (2016)Performance analysis of multipath transmission over 802.11-based multihop ad hoc networks: a cross-layer perspective., , and . IET Commun., 2 (2): 380-387 (2008)Dempster-Shafer's Evidence Theory-based Edge Detection., , and . Int. J. Fuzzy Log. Intell. Syst., 11 (1): 19-24 (2011)A morphological estimator for clique potentials of binary Markov random fields., and . IEEE Signal Process. Lett., 7 (5): 120-122 (2000)Turbo Equalization for Two Dimensional Magnetic Recording Using Voronoi Model Averaged Statistics., , , and . IEEE J. Sel. Areas Commun., 34 (9): 2439-2449 (2016)A Hybrid Multilevel Inverter Topology for an Open-End Winding Induction-Motor Drive Using Two-Level Inverters in Series With a Capacitor-Fed H-Bridge Cell., , , , and . IEEE Trans. Ind. Electron., 57 (11): 3707-3714 (2010)An Effective Entity Resolution Method., and . DMIN, page 10-16. CSREA Press, (2010)A New Algorithm for Learning Parameters of a Bayesian Network from Distributed Data., and . ICDM, page 585-588. IEEE Computer Society, (2002)On the morphological analysis of binary random fields., and . ICIP, page 514-517. IEEE Computer Society, (1995)