Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Engineering for Security Attacks., , , , and . MISNC, page 6. ACM, (2016)Special Section on Interactive Multimedia., , , and . IEEE Trans. Multimedia, 13 (5): 841-843 (2011)Extending approximate Bayesian computation methods to high dimensions via a Gaussian copula model., , , and . Computational Statistics & Data Analysis, (2017)Multiview Image Coding Based on Geometric Prediction., , , and . IEEE Trans. Circuits Syst. Video Techn., 17 (11): 1536-1548 (2007)Optimal layout and path planning for flame cutting of sheet metals., , , and . Int. J. Computer Integrated Manufacturing, 22 (1): 30-41 (2009)Spatial interpolation of McArthur's Forest Fire Danger Index across Australia: Observational study., , , , and . Environmental Modelling and Software, (2013)Computation of Lyapunov values for two planar polynomial differential systems., , , and . Applied Mathematics and Computation, 204 (1): 240-248 (2008)Particle Filter with Operational-Scalable Takagi-Sugeno Fuzzy Degradation Model for Filter-Clogging Prognosis., , and . J. Aerospace Inf. Sys., 12 (5): 398-412 (2015)Single-image super-resolution in RGB space via group sparse representation., , and . IET Image Processing, 9 (6): 461-467 (2015)Instructions Micromachined Tunable Filter Via Actuation Of Fabry-Parot Cavity., , , , and . International Journal of Computational Engineering Science, 4 (3): 451-454 (2003)