Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Instigating Maritime Studies Via Rapid Prototyping And Robotics: A Case From The SMARTBOAT Initiative., , , , , and . ECMS, page 170-177. European Council for Modeling and Simulation, (2023)Communications of the ECMS, Volume 37, Issue 1, June 2023.Deformable MRI-Ultrasound Registration via Attribute Matching and Mutual-Saliency Weighting for Image-Guided Neurosurgery., , , , , , , , , and 5 other author(s). POCUS/BIVPCS/CuRIOUS/CPM@MICCAI, volume 11042 of Lecture Notes in Computer Science, page 165-171. Springer, (2018)Real-time GPS indoor for USV tracking using Lookup Table., , and . ICARSC, page 257-262. IEEE, (2023)Position and force control of a flexible robot manipulator for orthopedic surgery., , , and . ECC, page 3347-3352. IEEE, (2009)Haptic Positioning Environment for the Hip Resurfacing Surgery., , , and . Int. J. Online Eng., 8 (S1): 23-25 (2012)Non-rigid registration of 3D ultrasound for neurosurgery using automatic feature detection and matching., , , , , , , , , and 4 other author(s). Int. J. Comput. Assist. Radiol. Surg., 13 (10): 1525-1538 (2018)A new word-confidence threshold technique to enhance the performance of spoken dialogue systems., , , and . EUROSPEECH, page 1395-1398. ISCA, (1999)SLHMM: a continuous speech recognition system based on Alphanet-HMM., , , and . ICASSP (1), page 213-216. IEEE Computer Society, (1994)Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection., , and . IWIA, page 3-12. IEEE Computer Society, (2003)Low Rate DoS Attack to Monoprocess Servers., , and . SPC, volume 3934 of Lecture Notes in Computer Science, page 43-57. Springer, (2006)