Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure key agreement for multi-device home IoT environment., and . Internet Things, (2020)BestChoice: A Decision Support System for Supplier Selection in e-Marketplaces., , , , , and . DEECS, volume 4055 of Lecture Notes in Computer Science, page 198-208. Springer, (2006)Modified Naïve Bayes Classifier for E-Catalog Classification., , , and . DEECS, volume 4055 of Lecture Notes in Computer Science, page 246-257. Springer, (2006)Exploiting Attribute-Wise Distribution of Keywords and Category Dependent Attributes for E-Catalog Classification., , , and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 985-992. Springer, (2008)Viewpoint stabilization for live collaborative video augmentations., and . ISMAR, page 241-242. IEEE Computer Society, (2006)Learning and matching multiscale template descriptors for real-time detection, localization and tracking., and . CVPR, page 1457-1464. IEEE Computer Society, (2011)Robust and accurate reconstruction of the time-dependent continuous volatility from option prices., , , , , and . Comput. Appl. Math., 43 (5): 307 (July 2024)End to End Table Transformer., , , , and . ICDAR (1), volume 14804 of Lecture Notes in Computer Science, page 331-345. Springer, (2024)Finding underlying factors for reciprocal trust formation., , and . RACS, page 86-91. ACM, (2015)A Server Placement Algorithm Conscious of Communication Delays and Relocation Costs., , and . NETWORKING Workshops, volume 2376 of Lecture Notes in Computer Science, page 83-89. Springer, (2002)