Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nanotoxicity modeling in multidimentional cube., , , , and . BIBM, page 25-28. IEEE Computer Society, (2014)A novel approach to fault diagnostics and prognostics., , , and . ICRA, page 604-609. IEEE, (2003)High performance VOX prototype development and experimental results., , , , and . ICASSP (2), page 641-644. IEEE, (2003)An Automated Acoustic System to Monitor and Classify Birds., , , , , , , , , and 1 other author(s). EURASIP J. Adv. Sig. Proc., (2006)Assessing the public image of the NIH Clinical and Translational Science Awards (CTSA) program through analysis of publications., , , and . BIBM, page 1207-1213. IEEE, (2016)Deep Models for Engagement Assessment With Scarce Label Information., , , , , , , and . CoRR, (2016)A Complete Image Compression Scheme Based on Overlapped Block Transform with Post-Processing., , , , , and . EURASIP J. Adv. Sig. Proc., (2006)A Deep Transfer Learning Approach for Improved Post-Traumatic Stress Disorder Diagnosis., , , , , , , and . ICDM, page 11-20. IEEE Computer Society, (2017)A note on simultaneous isolation of sensor and actuator faults., and . IEEE Trans. Contr. Sys. Techn., 12 (1): 183-192 (2004)Agent-based Distributed Intrusion Detection Methodology for MANETs., , , , and . Security and Management, page 200-206. CSREA Press, (2006)