Author of the publication

Local image representations using pruned salient points with applications to CBIR.

, , , and . ACM Multimedia, page 287-296. ACM, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Localized content based image retrieval., , , , and . Multimedia Information Retrieval, page 227-236. ACM, (2005)Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor., and . J. Parallel Distributed Comput., (August 2023)Discovering Associations Among Technologies Using Neural Networks for Tech-Mining., , , and . IEEE Trans. Engineering Management, 69 (4): 1394-1404 (2022)An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments., and . Clust. Comput., 23 (4): 2609-2627 (2020)Local image representations using pruned salient points with applications to CBIR., , , and . ACM Multimedia, page 287-296. ACM, (2006)Recommender system based on customer segmentation (RSCS)., and . Kybernetes, 45 (6): 946-961 (2016)Improving the Accuracy of Pre-trained Word Embeddings for Sentiment Analysis., , and . CoRR, (2017)Smartphone-centric human posture monitoring system., , and . IHTC, page 1-4. IEEE, (2014)A fully scalable big data framework for Botnet detection based on network traffic analysis., , and . Inf. Sci., (2020)Text Classification based on Multiple Block Convolutional Highways., , and . CoRR, (2018)