From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Optimal Dynamic Threat Evaluation and Weapon Scheduling Technique., и . SGAI Conf., стр. 437-450. Springer, (2009)Fingerprint Enhancement and Reconstruction., и . ICIC (2), том 5755 из Lecture Notes in Computer Science, стр. 660-669. Springer, (2009)Role of Corner Detection in Capturing Shape Outlines., и . JCIS, Atlantis Press, (2006)Handling Insider Threat Through Supervised Machine Learning Techniques., , , и . EUSPN/ICTH, том 177 из Procedia Computer Science, стр. 64-71. Elsevier, (2020)Security, Safety and Trust Management (SSTM '17)., , , , и . WETICE, стр. 242-243. IEEE Computer Society, (2017)Optimized polygonal approximation by dominant point deletion.. Pattern Recognit., 41 (1): 227-239 (2008)Diving Deep With BotLab-DS1: A Novel Ground Truth-Empowered Botnet Dataset., , , , , и . IEEE Access, (2024)Growing B-spline Model for Efficient Approximation of Complex Curves., и . IV, стр. 507-512. IEEE Computer Society, (2011)Piecewise Polygonal Approximation of Digital Curves., , и . IV, стр. 991-996. IEEE Computer Society, (2004)Efficient Representation of Zooming Information in Videos Using Multi Resolution Mosaics., и . ICIC (2), том 6216 из Lecture Notes in Computer Science, стр. 294-300. Springer, (2010)