Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resolving authorization conflicts by ontology views for controlled access to a digital library., , , and . J. Knowledge Management, 19 (1): 45-59 (2015)Classification of Sodar Data Using Fractal Features., , and . ICVGIP, Allied Publishers Private Limited, (2002)Estimation of atmospheric boundary layer using Kalman filter technique., , , , and . Signal Processing, 82 (11): 1763-1771 (2002)Sodar image segmentation by fuzzy c-means., , and . Signal Processing, 54 (3): 295-301 (1996)PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation., and . FSE, volume 2887 of Lecture Notes in Computer Science, page 347-361. Springer, (2003)Continuous detection of atmospheric patterns from SODAR signals., , , and . Signal Processing, 74 (2): 153-168 (1999)A Symmetry Based Clustering Technique for Multi-Spectral Satellite Imagery., and . ICVGIP, Allied Publishers Private Limited, (2002)Boundary extraction of sodar images., , and . Signal Processing, 62 (2): 229-235 (1997)Intermediate Monitoring, Sample Size Reassessment, and Multi-Treatment Optimal Response-Adaptive Designs for Phase III Clinical Trials with More Than One Constraint., and . Communications in Statistics - Simulation and Computation, 38 (6): 1308-1320 (2009)Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems., , and . IACR Cryptology ePrint Archive, (2006)