Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Pruning Schemes for Distance-Based Outlier Detection., and . ECML/PKDD (2), volume 5782 of Lecture Notes in Computer Science, page 160-175. Springer, (2009)National Institute of Informatics, Japan at TRECVID 2012., , , , , , , , and . TRECVID, National Institute of Standards and Technology (NIST), (2012)A Cartography of Spatial Relationships in a Symbolic Image Database., , and . CAIP (1), volume 6854 of Lecture Notes in Computer Science, page 377-385. Springer, (2011)Re-ranking for person re-identification., , , , , and . SoCPaR, page 304-308. IEEE, (2013)qEstimation: a process for estimating size and effort of software testing., , and . ICSSP, page 20-28. ACM, (2013)Non-parametric Methods for Correlation Analysis in Multivariate Data with Applications in Data Mining.. Karlsruhe Institute of Technology, (2015)Multi-UAV Coverage Strategy with V-shaped Formation for Patrol and Surveillance., , , and . ICCAIS, page 487-492. IEEE, (2022)Person re-identification with mutual re-ranking., , , and . Vietnam. J. Comput. Sci., 4 (4): 233-244 (2017)4S: Scalable subspace search scheme overcoming traditional Apriori processing., , and . IEEE BigData, page 359-367. IEEE Computer Society, (2013)Mining Outliers with Ensemble of Heterogeneous Detectors on Random Subspaces., , and . DASFAA (1), volume 5981 of Lecture Notes in Computer Science, page 368-383. Springer, (2010)