Author of the publication

Evaluating User Image Tagging Credibility.

, , , , and . CLEF, volume 9283 of Lecture Notes in Computer Science, page 41-52. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and Performance Evaluation of Multiaccess Mechanisms at SUPERLAN., , , and . MASCOTS, page 176-182. The Society for Computer Simulation, (1993)Reconnaissance de mots manuscrits hors-vocabulaire en utilisant des ressources web., , , and . Document Numérique, 17 (3): 77-96 (2014)Duplicate image detection in a stream of web visual data., , and . CBMI, page 1-6. IEEE, (2015)Using the Web to Create Dynamic Dictionaries in Handwritten Out-of-Vocabulary Word Recognition., , , and . ICDAR, page 989-993. IEEE Computer Society, (2013)Content dependency of the traffic control in the darwin streaming server., , , and . NGI, page 65-70. IEEE, (2012)NetForecast: A Delay Prediction Scheme for Provider Controlled Networks., , and . GLOBECOM, page 502-507. IEEE, (2007)BLSTM-based handwritten text recognition using Web resources., , , and . ICDAR, page 466-470. IEEE Computer Society, (2015)relocated from Tunis, Tunisia.QoE-Aware Sustainable Throughput for Energy-Efficient Video Streaming., , and . BDCloud-SocialCom-SustainCom, page 493-500. IEEE Computer Society, (2016)Scalable domain adaptation of convolutional neural networks., , and . CoRR, (2015)Effect of Packet Delay Variation on Video-Voice over DiffServ-MPLS in IPv4-IPv6 Networks, , , and . CoRR, (2012)