From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy Enforcement in Data Analysis Workflows, , , и . Proceedings of the Workshop on Privacy Enforcement and Accountability with Semantics (PEAS2007) at ISWC/ASWC2007, Busan, South Korea, (ноября 2007)Incremental Mining of Frequent Patterns without Candidate Generation or Support Constraint., и . IDEAS, стр. 111-116. IEEE Computer Society, (2003)HIAuth: A Hierarchical Implicit Authentication System for IoT Wearables Using Multiple Biometrics., , и . IEEE Access, (2021)Implicit IoT authentication using on-phone ANN models and breathing data., , и . Internet Things, (декабря 2023)Opportunistic Implicit User Authentication for Health-Tracking IoT Wearables., , , и . CoRR, (2021)Context-Dependent Implicit Authentication for Wearable Device User., и . CoRR, (2020)Proteus: A reconfigurable computational network for computer vision., , , , , , , , , и 8 other автор(ы). Mach. Vis. Appl., 8 (2): 85-100 (1995)Proteus: a reconfigurable computational network for computer vision., , , , , , , , , и 8 other автор(ы). ICPR (4), стр. 43-54. IEEE, (1992)A Design of Artificial Intelligence Education., , , , , и . TALE, стр. 1-8. IEEE, (2023)Using CMAF to deliver high resolution immersive video with ultra-low end to end latency for live streaming., , , , и . MHV, стр. 1-6. ACM, (2022)