Author of the publication

Fault-tolerant network routings for (k + 1)-node connected and (k + 1)-edge connected graphs.

, , and . Syst. Comput. Jpn., 18 (11): 50-60 (1987)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative Face Detection from the Global to Local., and . ICIG (1), volume 11901 of Lecture Notes in Computer Science, page 320-331. Springer, (2019)Generate Identity-Preserving Faces by Generative Adversarial Networks., and . CoRR, (2017)A Filter Module Used in Pedestrian Detection System., , , and . AIAI, volume 204 of IFIP, page 212-220. Springer, (2006)Reliability evaluation of speech recognition in acoustic modeling., , , and . INTERSPEECH, page 971-974. ISCA, (2000)An Utterance Verification Algorithm in Keyword Spotting System., , , and . IbPRIA (2), volume 3523 of Lecture Notes in Computer Science, page 555-561. Springer, (2005)Object detection based on LHOG feature matching., and . ICDIP, volume 8878 of SPIE Proceedings, page 88782U. SPIE, (2013)Relevance of useful visual words in object retrieval., and . ICDIP, volume 8878 of SPIE Proceedings, page 88781Y. SPIE, (2013)A New Component Based Algorithm for Newspaper Layout Analysis., , , and . ICDAR, page 1176-1180. IEEE Computer Society, (2001)Stagnation Analysis in Particle Swarm Optimization., , and . SIS, page 92-99. IEEE, (2007)Distorted grid recognition with its application to microarray image analysis., , and . ICIG, page 128-131. IEEE Computer Society, (2004)