Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time and multi-view face tracking on mobile platform., , and . ICASSP, page 1485-1488. IEEE, (2011)Stresses dominate pulsated electrohydrodynamic spraying modes in near field., , , , and . NEMS, page 732-735. IEEE, (2011)Randomized Hough transform (RHT)., , and . ICPR (1), page 631-635. IEEE, (1990)Mining Bug Classifier and Debug Strategy Association Rules for Web-Based Applications., , , , and . ADMA, volume 5139 of Lecture Notes in Computer Science, page 427-434. Springer, (2008)A New Sleep Mechanism Based on SDN Framework., , , and . BigData Congress, page 565-568. IEEE Computer Society, (2017)Deep learning in exploring semantic relatedness for microblog dimensionality reduction., , and . GlobalSIP, page 98-102. IEEE, (2015)Zero Correlation Zone Sequence Pair Sets for MIMO Radar., and . IEEE Trans. Aerosp. Electron. Syst., 48 (3): 2100-2113 (2012)Randomized Hough Transform (RHT) in Engineering Drawing Vectorization System., , and . MVA, page 173-176. (1990)Identification of Design Patterns Using Dependence Analysis., , , , , and . SEKE, page 289-292. Knowledge Systems Institute Graduate School, (2012)Forward Private Searchable Encryption with Conjunctive Keywords Query., , , and . SciSec, volume 11933 of Lecture Notes in Computer Science, page 308-322. Springer, (2019)