Author of the publication

Optimization of Score-Level Biometric Data Fusion by Constraint Construction Training.

, , , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 167-179. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cloud-based architecture for emergency management and first responders localization in smart city environments., , , and . Comput. Electr. Eng., (2016)GRASP-based resource re-optimization for effective big data access in federated clouds., , , and . Future Gener. Comput. Syst., (2016)Distributed Group Key Management for Event Notification Confidentiality Among Sensors., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (3): 566-580 (2020)Prosperity of IT security technologies in homeland defense., , and . J. Ambient Intell. Humaniz. Comput., 5 (2): 169-171 (2014)DELEX: a DEep Learning Emotive eXperience: Investigating empathic HCI., , , and . AVI, page 14:1-14:8. ACM, (2020)Low Resource Vs High Resource solutions for Federated learning sentiment analysis., , , , , and . ICCE, page 1-3. IEEE, (2023)Achieving a Lawfully-Secure Audio Recording Framework using Consumer Electronics., , , , and . ICCE, page 1-3. IEEE, (2023)Protection of Microscopy Images through Digital Watermarking Techniques., , , , and . INCoS, page 65-72. IEEE, (2014)A Kuramoto Model Based Approach to Extract and Assess Influence Relations., , , and . ISICA, volume 575 of Communications in Computer and Information Science, page 464-473. Springer, (2015)Analysis of Network Management and Monitoring Using Cloud Computing., , , , , and . ISICA, volume 575 of Communications in Computer and Information Science, page 343-352. Springer, (2015)