Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Music Structure Analysis Techniques for Music Applications, , and . Recent Advances in Multimedia Signal Processing and Communications, volume 231 of Studies in Computational Intelligence, Springer Berlin Heidelberg, (2009)Decision-theoretic approach to maximizing observation of multiple targets in multi-camera surveillance., , , and . AAMAS, page 155-162. IFAAMAS, (2012)Guest Editorial: Real-life Events in Multimedia: Detection, Representation, Retrieval, and Applications, , , and . Multimedia Tools and Applications, 70 (1): 1-6 (May 2014)Motion trajectory based video authentication., and . ISCAS (3), page 810-813. IEEE, (2003)A scalable signature scheme for video authentication., , and . Multimedia Tools Appl., 34 (1): 107-135 (2007)Multimedia Data Mining: State of the Art and Challenges, and . Multimedia Tools and Applications, 51 (1): 35-76 (January 2011)Multimodal Fusion for Multimedia Analysis: A Survey, , , and . Multimedia Systems, 16 (6): 345-379 (2010)Volumes From Overlaying 3-D Triangulations in Parallel., and . SSD, volume 692 of Lecture Notes in Computer Science, page 477-489. Springer, (1993)VIP: A Unifying Framework for Computational Eye-Gaze Research., , and . HBU, volume 8212 of Lecture Notes in Computer Science, page 209-222. Springer, (2013)Music scale modeling for melody matching., and . ACM Multimedia, page 359-362. ACM, (2003)