Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boolean Formulas for the Static Identification of Injection Attacks in Java., , , , and . LPAR, volume 9450 of Lecture Notes in Computer Science, page 130-145. Springer, (2015)A Thread-Safe Library for Binary Decision Diagrams., , and . SEFM, volume 8702 of Lecture Notes in Computer Science, page 35-49. Springer, (2014)Security Layers and Related Services within the Horizon Europe NEUROPULS Project., , , , , , , , , and 10 other author(s). DATE, page 1-6. IEEE, (2024)Real time Vehicle Color Recognition on a budget: an investigation on the usage of CNN architectures., , , , and . AVSS, page 1-8. IEEE, (2022)Point Selection: A New Comparison Scheme for Size Functions (With an Application to Monogram Recognition)., , , and . ACCV (1), volume 1351 of Lecture Notes in Computer Science, page 329-337. Springer, (1998)Locking discipline inference and checking., , , , and . ICSE, page 1133-1144. ACM, (2016)Image Retrieval through Abstract Shape Indication., , , , , , , , and . MVA, page 367-370. (2000)Combined Motion and Appearance Models for Robust Object Tracking in Real-Time., , , and . AVSS, page 412-417. IEEE Computer Society, (2009)Size Functions for Image Retrieval: A Demonstrator on Randomly Generated Curves., , , , and . CIVR, volume 2383 of Lecture Notes in Computer Science, page 235-244. Springer, (2002)