Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Spam Detection Using the Randomized Hough Transform-Support Vector Machine., , and . ICMLA (1), page 299-304. IEEE, (2013)Selective and Focused Invariant Recognition Using Distributed Associative Memories (DAM)., and . IEEE Trans. Pattern Anal. Mach. Intell., 12 (8): 809-814 (1990)Motion Prediction Using VC-Generalization Bounds., , , and . ICPR (1), page 151-154. IEEE Computer Society, (2002)Automated borders detection and adaptive segmentation for binary document images., , and . ICPR, page 737-741. IEEE Computer Society, (1996)Detection of human speech in structured noise., and . ICASSP (2), page 237-240. IEEE Computer Society, (1994)Integration of bottom-up and top-down cues for visual attention using non-linear relaxation., , , , and . CVPR, page 781-785. IEEE, (1994)A New Edge Detection Technique and Its Implementation., and . IEEE Trans. Systems, Man, and Cybernetics, 7 (12): 827-836 (1977)Reliable face recognition using adaptive and robust correlation filters., , and . Computer Vision and Image Understanding, 111 (3): 329-350 (2008)A Dynamic and Multiresolution Model of Visual Attention and Its Application to Facial Landmark Detection., and . Computer Vision and Image Understanding, 70 (1): 63-73 (1998)Texture segmentation using a diffusion region growing technique., , and . Pattern Recognition, 23 (9): 953-960 (1990)