Author of the publication

Duplicate detection approaches for quality assurance of document image collections.

, , , and . MEDES, page 152-158. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Acquiring Cyber Threat Intelligence through Security Information Correlation., , , , , and . CYBCONF, page 1-7. IEEE, (2017)Quality Assurance Tool Suite for Error Detection in Digital Repositories., and . ICADL, volume 8839 of Lecture Notes in Computer Science, page 48-58. Springer, (2014)Improved software vulnerability patching techniques using CVSS and game theory., , , , , and . Cyber Security, page 1-6. IEEE, (2017)A decision support model for situational awareness in National Cyber Operations Centers., , and . CyberSA, page 1-6. IEEE, (2016)Neural Network-Based Technique for Android Smartphone Applications Classification., , and . CyCon, page 1-17. IEEE, (2019)A Model for Format Endangerment Analysis using Fuzzy Logic., , and . iPRES, (2014)A Risk Analysis of File Formats for Preservation Planning., and . iPRES, (2013)Quality control of real-time panoramic views from the smart camera 360SCAN., , , and . ISCAS, page 650-653. IEEE, (2013)Correlating cyber incident information to establish situational awareness in Critical Infrastructures., , , , , and . PST, page 78-81. IEEE, (2016)Braille Vision Using Braille Display and Bio-inspired Camera., , and . CSEDU (3), page 214-219. SciTePress, (2014)