Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Solution to Authentication of Images with a Secure Camera., , , , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 3022 of SPIE Proceedings, page 290-297. SPIE, (1997)Guest Editorial., , , and . Int. J. Computer Integrated Manufacturing, 20 (7): 617-618 (2007)Understanding intention of movement from electroencephalograms., and . Expert Systems, 24 (5): 295-304 (2007)Automobile transmission design as a constraint satisfaction problem: modelling the kinematic level., and . AI EDAM, 5 (3): 137-171 (1991)Discussion: The Burroughs B 5000 in Retrospect., , , , , , , , , and 11 other author(s). IEEE Annals of the History of Computing, 9 (1): 37-92 (1987)Constraint Satisfaction in Prolog: Complexity and Theory-Based Heuristics.. Inf. Sci., 83 (3&4): 113-131 (1995)Precision Complexity Analysis: A Case Study using Insertion Sort.. Inf. Sci., 73 (1-2): 139-189 (1993)Reals n-generic relative to some perfect tree.. J. Symb. Log., 73 (2): 401-411 (2008)A View of Artificial Intelligence.. New Generation Comput., 3 (3): 235-236 (1985)A comparative study of four novel sleep apnoea episode prediction systems., , , , , and . EUSIPCO, page 2367-2371. IEEE, (2009)