Author of the publication

Totally-Corrective Multi-class Boosting.

, , , and . ACCV (4), volume 6495 of Lecture Notes in Computer Science, page 269-280. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hedging American contingent claims with arbitrage costs, and . Chaos, Solitons & Fractals, 32 (2): 598--603 (April 2007)Hedging American contingent claims with constrained portfolios under a higher interest rate for borrowing, and . Chaos, Solitons & Fractals, 24 (2): 617--625 (April 2005)A 1.2 TB/s on-chip ring interconnect for 45nm 8-core enterprise Xeon® processor., , , , , , , and . ISSCC, page 180-181. IEEE, (2010)Genome sequencing reveals insights into physiology and longevity of the naked mole rat, , , , , , , , , and 26 other author(s). Nature, 479 (7372): 223--227 (November 2011)A programmable pre-cursor ISI equalization circuit for high-speed serial link over highly lossy backplane channel., , , , and . CCECE, page 1221-1226. IEEE, (2009)A 10-Gb/s backplane transmitter with a FIR pre-emphasis equalizer to suppress ISI at data centers and edges simultaneously., , , and . CCECE, page 1213-1216. IEEE, (2009)On the signed star domination numbers of trees., , and . Ars Comb., (2016)Dirty-Paper Coding Based Secure Transmission for Multiuser Downlink in Cellular Communication Systems., and . IEEE Trans. Vehicular Technology, 66 (7): 5947-5960 (2017)Security analysis of optimal multi-carrier spread-spectrum embedding., , , , and . ChinaSIP, page 851-855. IEEE, (2015)Image tampering localization via estimating the non-aligned double JPEG compression., , , and . Media Watermarking, Security, and Forensics, volume 8665 of SPIE Proceedings, page 86650R. SPIE, (2013)