Author of the publication

Metrological evaluation of modeling method between Kinect Fusion and 3D Scan with Kinect V2.

, , and . ICMLC, page 363-368. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Two-Stage Sparse Representation Method., , and . CoRR, (2014)A Novel Privacy-Preserving Group Matching Scheme in Social Networks., , , , , and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 336-347. Springer, (2014)Triple line-voltage cascaded VIENNA converter applied as the medium-voltage rectifier., , , and . IECON, page 1635-1641. IEEE, (2017)Frequent pattern mining: current status and future directions, , , and . Data Mining and Knowledge Discovery, 15 (1): 55--86 (Aug 1, 2007)Improvement of Cerebral Microbleeds Detection Based on Discriminative Feature Learning., , , and . Fundam. Informaticae, 168 (2-4): 231-248 (2019)Exploiting Context Graph Attention for POI Recommendation in Location-Based Social Networks., and . DASFAA (1), volume 10827 of Lecture Notes in Computer Science, page 83-99. Springer, (2018)Robust Principal Component Analysis with Missing Data., , , and . CIKM, page 1149-1158. ACM, (2014)Robust Reputation-Based Ranking on Bipartite Rating Networks., , , and . SDM, page 612-623. SIAM / Omnipress, (2012)Extracting redundancy-aware top-k patterns., , , and . KDD, page 444-453. ACM, (2006)Mining closed discriminative dyadic sequential patterns., , and . EDBT, page 21-32. ACM, (2011)