Author of the publication

Template Matching for Large Transformations.

, , and . ICANN (2), volume 4669 of Lecture Notes in Computer Science, page 169-179. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A probabilistic method for hierarchical 2D-3D tracking., and . IJCNN, page 1-8. IEEE, (2010)A Colorimetric Sensor Array for Organics in Water, and . Journal of the American Chemical Society, 127 (33): 11548-11549 (2005)THE RESEARCH AND IMPLEMENTATION OF PASSENGER CAR'S TRANSPORTATION PLANNING PROBLEM, , and . Computer Science & Engineering: An International Journal (CSEIJ), 5 (4): 12 (August 2015)SoccerNet 2022 Challenges Results, , , , , , , , , and 84 other author(s). MMSports@MM 2022: Proceedings of the 5th International ACM Workshop on Multimedia Content Analysis in Sports, Lisboa, Portugal, 14 October 2022, page 75--86. ACM, (2022)The Astropy Project: Sustaining and Growing a Community-oriented Open-source Project and the Latest Major Release (v5.0) of the Core Package, , , , , , , , , and 126 other author(s). (2022)cite arxiv:2206.14220Comment: 43 pages, 5 figures. To appear in ApJ. The author list has two parts: the authors that made significant contributions to the writing and/or coordination of the paper, followed by maintainers of and contributors to the Astropy Project. The position in the author list does not correspond to contributions to the Astropy Project as a whole.Quantifying Sources of Uncertainty in Deep Learning-Based Image Reconstruction., , , , , and . CoRR, (2020)Clustering Subway Station Arrival Patterns Using Weighted Dynamic Time Warping., , and . IEEM, page 531-535. IEEE, (2018)Detecting Malicious Web Requests Using an Enhanced TextCNN., , , , , , and . COMPSAC, page 768-777. IEEE, (2020)Neural Network Self-Tuning Control for a Piezoelectric Actuator., , , and . Sensors, 20 (12): 3342 (2020)Verifiable and Forward-secure Encrypted Search Using Blockchain Techniques., , and . ICC, page 1-7. IEEE, (2020)