Author of the publication

Text Segmentation by Automatically Designed Morphological Operators.

, , and . SIBGRAPI, page 284-291. IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Terada, Routo
add a person with the name Terada, Routo
 

Other publications of authors with the same name

Multi-Resolution Classification Trees in OCR Design., , , , , and . SIBGRAPI, page 59-66. IEEE Computer Society, (2001)Nonlinear Parity Circuits and their Cryptographic Applications., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 582-600. Springer, (1990)Automatic Programming of MMach's for OCR., , , and . ISMM, volume 5 of Computational Imaging and Vision, page 385-392. Kluwer, (1996)Factoring a Multiprime Modulus N with Random Bits., and . ISC, volume 7807 of Lecture Notes in Computer Science, page 185-196. Springer, (2013)An Augmented Family of Cryptographic Parity Circuits., and . ISW, volume 1396 of Lecture Notes in Computer Science, page 198-208. Springer, (1997)RSA and Elliptic Curve Least Significant Bit Security., and . LATINCRYPT, volume 8895 of Lecture Notes in Computer Science, page 146-161. Springer, (2014)A Stacked Ensemble Classifier for an Intrusion Detection System in the Edge of IoT and IIoT Networks., , , , , , and . LATINCOM, page 1-6. IEEE, (2022)Recovery of the secret on Binary Ring-LWE problem using random known bits - Extended Version., and . J. Internet Serv. Appl., 15 (1): 39-45 (2024)Comparison of Two Signature Schemes Based on the MQ Problem and Quartz., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (12): 2527-2538 (2016)Applying Hoeffding Tree Algorithms for Effective Stream Learning in IoT DDoS Detection., , , , , , and . LATINCOM, page 1-6. IEEE, (2023)