Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy rough sets hybrid scheme for motion and scene complexity adaptive deinterlacing., , , , , and . Image Vis. Comput., 27 (4): 425-436 (2009)Real-time signal processing in embedded systems., , , and . J. Syst. Archit., (2016)Lossless compression for aurora spectral images using fast online bi-dimensional decorrelation method., , , , , and . Inf. Sci., (2017)Fuzzy Weighted Approach to Improve Visual Quality of Edge-Based Filtering., , , , and . IEEE Trans. Consumer Electronics, 53 (4): 1661-1667 (2007)Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study., , , and . New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, Springer, (2008)Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies., , and . ICISS, volume 3803 of Lecture Notes in Computer Science, page 21-35. Springer, (2005)An assurance process for Big Data trustworthiness., , and . Future Gener. Comput. Syst., (2023)Rethinking Certification for Trustworthy Machine-Learning-Based Applications., , , and . IEEE Internet Comput., 27 (6): 22-28 (November 2023)Reliability and capability based computation offloading strategy for vehicular ad hoc clouds., , , , , and . J. Cloud Comput., (2019)A test-based security certification scheme for web services., , , and . ACM Trans. Web, 7 (2): 5:1-5:41 (2013)