Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrative System for Deep Packet Inspection and Network Anomaly Detection amp; Defense, , , , and . Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, page 1-4. (2011)One-Class SVM with Negative Examples for Fingerprint Liveness Detection., , , , and . CCBR, volume 8833 of Lecture Notes in Computer Science, page 216-224. Springer, (2014)A Multiphase Level Set Evolution Scheme for Aerial Image Segmentation Using Multi-scale Image Geometric Analysis., , and . SSPR/SPR, volume 4109 of Lecture Notes in Computer Science, page 56-64. Springer, (2006)An adaptive meshless method for spectrally resolved bioluminescence tomography., , , , , , , and . ICIP, page 2541-2544. IEEE, (2009)Performance Optimisation for DSDV in VANETs., , , , , , and . UKSim, page 514-519. IEEE, (2015)A hierarchical registration algorithm for fingerprints from multi-type capture sensors., , , , , and . ICB, page 1-6. IEEE, (2013)An improvement of IP address lookup based on rule filter analysis., , and . ICC Workshops, page 688-693. IEEE, (2014)Semi-supervised nonlinear dimensionality reduction., , , and . ICML, volume 148 of ACM International Conference Proceeding Series, page 1065-1072. ACM, (2006)The interpretation of experimental observation date for the development of mechanisms based creep damage constitutive equations for high chromium steel., , and . ICAC, page 1-6. IEEE, (2015)The research of forest fire monitoring application., , , and . Geoinformatics, page 1-5. IEEE, (2010)