Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Margin Maximizing Loss Functions, , and . (2004)Properties Emulation on TD-LTE Electric Power Wireless Private., , and . ICCCS (5), volume 11067 of Lecture Notes in Computer Science, page 563-573. Springer, (2018)Graph similarity rectification for person search., , , , , and . Neurocomputing, (2021)Stability and performance in peer to peer networks. University of Illinois Urbana-Champaign, USA, (2013)Stability of a Peer-to-Peer Communication System., and . IEEE Trans. Inf. Theory, 58 (7): 4693-4713 (2012)Predicting customer churn through interpersonal influence., , , and . Knowl. Based Syst., (2012)Support Vector Machines, Kernel Logistic Regression and Boosting., and . Multiple Classifier Systems, volume 2364 of Lecture Notes in Computer Science, page 16-26. Springer, (2002)Stability of a peer-to-peer communication system., and . PODC, page 321-330. ACM, (2011)Multiple Scaled Person Re-Identification Framework for HD Video Surveillance Application., , , , and . CCCV (2), volume 547 of Communications in Computer and Information Science, page 219-228. Springer, (2015)A Method for Inferring Label Sampling Mechanisms in Semi-Supervised Learning., , , and . NIPS, page 1161-1168. (2004)