Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iris recognition using shape-guided approach and game theory., , and . Pattern Anal. Appl., 14 (4): 329-348 (2011)Secure and simplified access to home appliances using Iris recognition., , and . CIB, page 22-29. IEEE, (2009)Ultra-low power DLMS adaptive filter for hearing aid applications., and . ISLPED, page 352-357. ACM, (2001)A 160 mV Robust Schmitt Trigger Based Subthreshold SRAM., , and . J. Solid-State Circuits, 42 (10): 2303-2313 (2007)An On-Chip Test Structure and Digital Measurement Method for Statistical Characterization of Local Random Variability in a Process., , , , and . J. Solid-State Circuits, 43 (9): 1951-1963 (2008)Robust high-performance low-power carry select adder., and . ASP-DAC, page 503-506. ACM, (2003)Low-Overhead Maximum Power Point Tracking for Micro-Scale Solar Energy Harvesting Systems., , , and . VLSI Design, page 215-220. IEEE Computer Society, (2012)An Evaluation of User Movement Data., , , , and . IEA/AIE, volume 10868 of Lecture Notes in Computer Science, page 729-735. Springer, (2018)Anti-spoofing Approach Using Deep Convolutional Neural Network., and . IEA/AIE, volume 10868 of Lecture Notes in Computer Science, page 745-750. Springer, (2018)Continuous Authentication on Smartphones Using An Artificial Immune System., , and . MAICS, volume 1964 of CEUR Workshop Proceedings, page 171-174. CEUR-WS.org, (2017)