Author of the publication

Comment: Projection Methods Require Black Border Removal.

, , and . IEEE Trans. Pattern Anal. Mach. Intell., 31 (4): 762 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deciding Accuracy of Differential Privacy Schemes., , , , and . CoRR, (2020)Deciding Concurrent Planar Monotonic Linear Hybrid Systems., , and . FORMATS, volume 9268 of Lecture Notes in Computer Science, page 256-269. Springer, (2015)Actively Learning to Verify Safety for FIFO Automata., , , and . FSTTCS, volume 3328 of Lecture Notes in Computer Science, page 494-505. Springer, (2004)Relating Syntactic and Semantic Perturbations of Hybrid Automata., , and . CONCUR, volume 118 of LIPIcs, page 26:1-26:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Stability Preserving Simulations and Bisimulations for Hybrid Systems., , and . IEEE Trans. Automat. Contr., 60 (12): 3210-3225 (2015)Verification of Bounded Discrete Horizon Hybrid Automata., , , and . IEEE Trans. Automat. Contr., 57 (6): 1445-1455 (2012)Conformance testing in the presence of multiple faults., and . SODA, page 1136-1145. SIAM, (2005)Document recognition: an attribute grammar approach., , and . Document Recognition, volume 2660 of SPIE Proceedings, page 101-113. SPIE, (1996)Java-MaC: A Run-Time Assurance Approach for Java Programs., , , , and . Formal Methods Syst. Des., 24 (2): 129-155 (2004)Exact quantitative probabilistic model checking through rational search., , , , and . Formal Methods Syst. Des., 56 (1): 90-126 (2020)