Author of the publication

On Efficient Extraction of Pelvis Region from CT Data.

, , , , and . Bildverarbeitung für die Medizin, page 270-275. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple high-throughput analyses monitor the response of E. coli to perturbations, , , , , , , , , and 19 other author(s). Science, (2007)Aqua-Sim Next Generation: An NS-3 Based Underwater Sensor Network Simulator., , and . WUWNet, page 3:1-3:8. ACM, (2017)TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks., , and . ISCA, page 118-129. IEEE Computer Society, (2012)Tree bark re-identification using a deep-learning feature descriptor., , and . CoRR, (2019)Reuters Tracer: A Large Scale System of Detecting & Verifying Real-Time News Events from Twitter., , , , , , , , , and 5 other author(s). CIKM, page 207-216. ACM, (2016)Learning Dynamical Systems From Invariant Measures., , and . CoRR, (2023)TR Discover: A Natural Language Question Answering System for Interlinked Datasets., , , , , , , , , and 2 other author(s). ISWC (Posters & Demos), volume 1486 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)On Efficient Extraction of Pelvis Region from CT Data., , , , and . Bildverarbeitung für die Medizin, page 270-275. Springer, (2021)TR Discover: A Natural Language Interface for Querying and Analyzing Interlinked Datasets., , , , , , , , , and 1 other author(s). ISWC (2), volume 9367 of Lecture Notes in Computer Science, page 21-37. Springer, (2015)CYBEX: the cybersecurity information exchange framework (x.1500)., , , , , , , , , and 1 other author(s). Comput. Commun. Rev., 40 (5): 59-64 (2010)