Author of the publication

Telemedicine Using Free Voice over Internet Protocol (VoIP) Technology.

, , , , , and . MMVR, volume 163 of Studies in Health Technology and Informatics, page 369-371. IOS Press, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes., , and . IEEE Trans. Neural Networks Learn. Syst., 28 (4): 917-933 (2017)When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time., , and . Neural Comput., 31 (8): 1624-1670 (2019)Semisupervised, Multilabel, Multi-Instance Learning for Structured Data., and . Neural Comput., 29 (4): 1053-1102 (2017)A Locally Optimal Algorithm for Estimating a Generating Partition from an Observed Time Series and Its Application to Anomaly Detection., , and . Neural Comput., (2018)Learned Iterative Decoding for Lossy Image Compression Systems., , , , , and . CoRR, (2018)Cyber defense technology networking and evaluation., , , , , , , , , and 14 other author(s). Commun. ACM, 47 (3): 58-61 (2004)Response to Logie and Della Sala: Brain training in schools, where is the evidence?, and . Br. J. Educ. Technol., 42 (5): 101- (2011)An Overview of Population Genetic Data Simulation., , , , and . J. Comput. Biol., 19 (1): 42-54 (2012)Detection of Backdoors in Trained Classifiers Without Access to the Training Set., , and . IEEE Trans. Neural Networks Learn. Syst., 33 (3): 1177-1191 (2022)Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing., , and . CoRR, (2020)