Author of the publication

Automated Approach To Classification Of Mine-Like Objects Using Multiple-Aspect Sonar Images.

, , , and . J. Artif. Intell. Soft Comput. Res., 4 (2): 133-148 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Argument ontology for describing scientific articles: A statistical study based on articles from two research areas., , , and . ASIST, volume 56 of Proc. Assoc. Inf. Sci. Technol., page 855-857. Wiley, (2019)Modeling and representation of intangible cultural heritage knowledge using linked data and ontology., and . ASIST, volume 56 of Proc. Assoc. Inf. Sci. Technol., page 409-412. Wiley, (2019)Research on Fire Control Modeling Problems of UAV Swarms' Air Combat Under the Decoys Influence., , , , and . ICCAIS, page 463-468. IEEE, (2021)A lightweight VMM on many core for high performance computing., , , , , and . VEE, page 111-120. ACM, (2013)DynaCut: A Framework for Dynamic and Adaptive Program Customization., , , and . Middleware, page 275-287. ACM, (2023)Protecting Outsourced Data Privacy with Lifelong Policy Carrying., , , , and . HPCC/EUC, page 896-905. IEEE, (2013)Interpretable Deep Convolutional Neural Networks via Meta-learning., , and . IJCNN, page 1-9. IEEE, (2018)eRoc: A Distributed Blockchain System with Fast Consensus., , , , , and . CyberC, page 205-214. IEEE, (2019)Using Three-Dimensional Features to Improve Terrain Classification., , , , and . CVPR, page 915-920. IEEE Computer Society, (1997)Transparent Security-Sensitive Process Protection via VMM-Based Process Shadowing., , , and . COMPSAC Workshops, page 115-120. IEEE Computer Society, (2013)