Author of the publication

Semantic-Analysis Object Recognition: Automatic Training Set Generation Using Textual Tags.

, , , , , and . ECCV Workshops (2), volume 8926 of Lecture Notes in Computer Science, page 309-322. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revision of defeasible preferences., , , and . Int. J. Approx. Reason., (2019)The Complexity of Reasoning about Spatial Congruence. CoRR, (2011)Fundamental Issues of Aesthetic Knowledge Representation., and . ECAI, page 313-317. IOS Press, (2004)Compliant Business Processes with Exclusive Choices from Agent Specification., , and . PRIMA, volume 9387 of Lecture Notes in Computer Science, page 603-612. Springer, (2015)The Spider-man Behavior Protocol: Exploring Both Public and Dark Social Networks for Fake Identity Detection in Terrorism Informatics., , , and . KDWeb, volume 1489 of CEUR Workshop Proceedings, page 77-88. CEUR-WS.org, (2015)The Brain is a Social Network., , , , and . KDWeb, volume 1959 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Strategic Argumentation is NP-Complete., , , , and . ECAI, volume 263 of Frontiers in Artificial Intelligence and Applications, page 399-404. IOS Press, (2014)Learning as Meaning Negotiation: A Model Based on English Auction., and . KES-AMSTA, volume 5559 of Lecture Notes in Computer Science, page 60-69. Springer, (2009)Designing for Compliance: Norms and Goals., , , and . RuleML America, volume 7018 of Lecture Notes in Computer Science, page 282-297. Springer, (2011)Superiority Based Revision of Defeasible Theories., , , and . RuleML, volume 6403 of Lecture Notes in Computer Science, page 104-118. Springer, (2010)