Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fingerprint-based user authentication scheme for multimedia systems., and . ICME, page 935-938. IEEE Computer Society, (2004)On the security of ID-based password authentication scheme using smart cards and fingerprints., , , and . ITRE, page 230-232. IEEE, (2005)Disocclusion using depth reliability map for view synthesis., , , and . ICASSP, page 1449-1452. IEEE, (2012)An efficient depth image-based rendering with depth reliability maps for view synthesis., , , and . J. Vis. Commun. Image Represent., (2016)K-directory community: Reliable service discovery in MANET., , , , , and . Pervasive Mob. Comput., 7 (1): 140-158 (2011)Failure prediction of tasks in the cloud at an earlier stage: a solution based on domain information mining., , , , and . Computing, 102 (9): 2001-2023 (2020)Image segmentation via grabcut and linear multi-scale smoothing., , and . ICCIP, page 474-478. ACM, (2017)Toward Human Chromosome Knowledge Engine., , , , and . Cybern. Syst., 55 (3): 730-737 (April 2024)Key Frame Extraction Algorithm for Surveillance Video Based on Golden Section., , , and . SSPS, page 78-81. ACM, (2019)Few-shot prototype alignment regularization network for document image layout segementation., , , , , , and . Pattern Recognit., (2021)