Author of the publication

Diffusion MRI Registration Using Orientation Distribution Functions.

, , , , , , , , and . IPMI, volume 5636 of Lecture Notes in Computer Science, page 626-637. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Does Playing Online Mobile Games Overcharge You for the Fun?, , and . MobiGames@MobiSys, page 13-18. ACM, (2015)Low-storage capture and loss recovery selective replay of real flows., , , , and . IEEE Communications Magazine, 50 (4): 114-121 (2012)Mutual Authentication between Aerial Base Stations and Core Network: A Lightweight Security Scheme., and . ITNAC, page 11-18. IEEE, (2023)An Early Decision Algorithm to Accelerate Web Content Filtering., , , and . ICOIN, volume 3961 of Lecture Notes in Computer Science, page 833-841. Springer, (2006)Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection., , , , , and . IEEE Access, (2022)Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems., , , , , , and . Int. J. Netw. Secur., 14 (5): 243-250 (2012)Structural and cognitive deficits in remitting and non-remitting recurrent depression: A voxel-based morphometric study., , , , , , , and . NeuroImage, 50 (1): 347-356 (2010)Does feature selection improve classification accuracy? Impact of sample size and feature selection on classification using anatomical magnetic resonance images., , , , and . NeuroImage, 60 (1): 59-70 (2012)Seeing Without Alarming Thief: Passive WiFi Sensing for Indoor Security Monitoring., , , and . MILCOM, page 239-240. IEEE, (2023)A prediction model for cognitive performance in health ageing using diffusion tensor imaging with graph theory., , , , , and . EMBC, page 527-530. IEEE, (2013)