Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Build an Automated Fingerprint Identification System., , , and . ISBAST, page 40-47. IEEE, (2013)Plug-n-Play AFIS Development for Criminal and Civil Applications., , , and . ISBAST, page 48-55. IEEE, (2013)Modeling of municipal waste disposal behaviors related to meteorological seasons using recurrent neural network LSTM models., , , , and . Ecol. Informatics, (2022)Capacity Issues in Meshed High Data Rate WPANs., , , and . AINA Workshops, page 1285-1290. IEEE Computer Society, (2008)On the induction of temporal structure by recurrent neural networks.. Nottingham Trent University, UK, (2014)British Library, EThOS.On the importance of sluggish state memory for learning long term dependency., , and . Knowl. Based Syst., (2016)Capacity Analysis of High Data Rate Wireless Personal Area Networks., , and . CNSR, page 125-131. IEEE Computer Society, (2008)A cross layer rate adaptation solution for IEEE 802.11 networks., , , and . Comput. Commun., 31 (8): 1638-1652 (2008)Novel estimates reveal subnational heterogeneities in disease-relevant contact patterns in the United States., , and . PLoS Comput. Biol., 18 (12): 1010742 (December 2022)A Rate-Adaptive MAC for IEEE 802.11 Networks., , and . CNSR, page 463-469. IEEE Computer Society, (2008)