Author of the publication

Face verification using elastic graph matching based on morphological signal decomposition

, , and . Signal Processing, 82 (6): 833--851 (June 2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational UAV Cinematography for Intelligent A/V Shooting Based on Semantic Visual Analysis., , , and . MMSports@MM, page 31-38. ACM, (2018)Frontal face authentication using morphological elastic graph matching., , and . IEEE Trans. Image Processing, 9 (4): 555-560 (2000)Efficient Online Subclass Knowledge Distillation for Image Classification., , and . ICPR, page 1007-1014. IEEE, (2020)Face Verification and Recognition for Digital Forensics and Information Security., , , , , , , and . ISDFS, page 1-6. IEEE, (2019)A Silicon Photonic Coherent Neuron with 10GMAC/sec processing line-rate., , , , , , , , , and . OFC, page 1-3. IEEE, (2021)Frontal Face Authentication using Variants of Dynamic Link Matching Based on Mathematical Morphology., , and . ICIP (1), page 122-126. IEEE Computer Society, (1998)Relevance Feedback in Deep Convolutional Neural Networks for Content Based Image Retrieval., and . SETN, page 27:1-27:7. ACM, (2016)Representative Class Vector Clustering-Based Discriminant Analysis., , and . IIH-MSP, page 526-529. IEEE, (2013)Nearest Class Vector Classification for Large-Scale Learning Problems., , and . TrustCom/BigDataSE/ISPA (2), page 11-16. IEEE, (2015)978-1-4673-7952-6.Neural Networks Training for Weapon Selection in First-Person Shooter Games., and . ICANN (3), volume 6354 of Lecture Notes in Computer Science, page 417-422. Springer, (2010)