Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Should We Prove Security Policies Correct?, , and . EGCDMAS, page 56-65. INSTICC Press, (2004)Content-based Image Resizing on Mobile Devices., , , and . VISAPP (2), page 87-90. SciTePress, (2012)Compressed SVG Representation of Raster Images Vectorized by DDT Triangulation., , and . Eurographics Italian Chapter Conference, page 233-239. Eurographics, (2006)A Survey of Digital Mosaic Techniques., , , and . Eurographics Italian Chapter Conference, page 129-135. Eurographics, (2006)An Improved Image Re-indexing Technique by Self Organizing Motor Maps., , and . CCIW, volume 5646 of Lecture Notes in Computer Science, page 62-70. Springer, (2009)Exploiting time-multiplexing structured light with picoprojectors., , , and . Three-Dimensional Image Processing, Measurement (3DIPM), and Applications, volume 9393 of SPIE Proceedings, page 939304. SPIE, (2015)Random-temporal block selection for video stabilization., , and . Digital Photography, volume 7876 of SPIE Proceedings, page 78760K. SPIE/IS&T, (2011)Cortical Bone Classification by Local Context Analysis., , , , and . MIRAGE, volume 4418 of Lecture Notes in Computer Science, page 567-578. Springer, (2007)Statistical Based Vectorization for Standard Vector Graphics., , and . International Conference on Computational Science (2), volume 3992 of Lecture Notes in Computer Science, page 334-341. Springer, (2006)Scene categorization using bag of Textons on spatial hierarchy., , , and . ICIP, page 2536-2539. IEEE, (2008)