Author of the publication

Target Tracking using a Particle Filter Based on the Projection Method.

, , and . ICASSP (3), page 1189-1192. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

One optimized I/O configuration per HPC application: leveraging the configurability of cloud., , , , and . APSys, page 15. ACM, (2011)Visual tracking using sequential importance sampling with a state partition technique., , , , and . ICIP (3), page 876-879. IEEE, (2005)Target Tracking using a Particle Filter Based on the Projection Method., , and . ICASSP (3), page 1189-1192. IEEE, (2007)ACIC: automatic cloud I/O configurator for HPC applications., , , , , , and . SC, page 38:1-38:12. ACM, (2013)Cloud versus in-house cluster: evaluating Amazon cluster compute instances for running MPI applications., , , , and . SC State of the Practice Reports, page 11:1-11:10. ACM, (2011)ACIC: automatic cloud I/O configurator for parallel applications., , , , , , and . HPDC, page 111-112. ACM, (2013)Image restoration using a hybrid combination of particle filtering and wavelet denoising., , , , and . ICIP (2), page 790-793. IEEE, (2005)Automatic diagnosis and response to memory corruption vulnerabilities., , , , and . CCS, page 223-234. ACM, (2005)Employing Checkpoint to Improve Job Scheduling in Large-Scale Systems., , , , , , and . JSSPP, volume 7698 of Lecture Notes in Computer Science, page 36-55. Springer, (2012)Reasoning About Complementary Intrusion Evidence., , , and . ACSAC, page 39-48. IEEE Computer Society, (2004)