Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Trace Transform and Its Applications., and . IEEE Trans. Pattern Anal. Mach. Intell., 23 (8): 811-828 (2001)Features invariant to affine distortions from the trace transform., and . ICIP (3), page 852-855. IEEE, (2001)Motion Detection based on Simulated Depth Measurement., , , and . KES, volume 243 of Frontiers in Artificial Intelligence and Applications, page 335-344. IOS Press, (2012)A face authentication system using the trace transform., , , and . Pattern Anal. Appl., 8 (1-2): 50-61 (2005)Face Authentication using the Trace Transform., , , and . CVPR (1), page 305-312. IEEE Computer Society, (2003)The "Invaders' Algorithm: Range of Values Modulation for Accelerated Correlation., and . IEEE Trans. Pattern Anal. Mach. Intell., 28 (11): 1882-1886 (2006)Triple Features for Linear Distorted Images.. CAIP, volume 970 of Lecture Notes in Computer Science, page 844-849. Springer, (1995)The Trace transform and its applications., and . NMBIA, page 207-214. Springer, (1998)Linear transformation parameter estimation for fault detection., and . ICPR, page 550-552. IEEE Computer Society, (1998)The trace transform as a tool to invariant feature construction., and . ICPR, page 1037-1039. IEEE Computer Society, (1998)