Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transparent Run-Time Defense Against Stack-Smashing Attacks., , and . USENIX Annual Technical Conference, General Track, page 251-262. USENIX, (2000)Computational Models for the Evolution of World Cuisines., , , and . ICDE Workshops, page 85-90. IEEE, (2019)A novel position prior using fusion of rule of thirds and image center for salient object detection., , and . Multimedia Tools Appl., 76 (8): 10521-10538 (2017)VICI: Visual Caller Identification for Contact Center Applications., and . NSS, volume 9408 of Lecture Notes in Computer Science, page 511-518. Springer, (2015)Eratosthenes sieve based key-frame extraction technique for event summarization in videos., , and . Multimedia Tools Appl., 77 (6): 7383-7404 (2018)Saliency threshold: a novel saliency detection model using Ising's theory on Ferromagnetism (STIF).. Multim. Syst., 26 (4): 397-411 (2020)SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Optimization., , , and . IEEE Trans. Autom. Control., 68 (2): 721-736 (February 2023)Decentralized multi-task stochastic optimization with compressed communications., , , and . Autom., (January 2024)Libsafe: Transparent System-wide Protection Against Buffer Overflow Attacks., and . DSN, page 541. IEEE Computer Society, (2002)Spam detection in voice-over-IP calls through semi-supervised clustering., , , and . DSN, page 307-316. IEEE Computer Society, (2009)