Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic reconstruction of deleted AVI video files composed of scattered and corrupted fragments., , , and . Multim. Tools Appl., 79 (37-38): 28355-28367 (2020)472MHz throughput asynchronous FIFO design on a Virtex-5 FPGA device., , , and . IEICE Electron. Express, 8 (9): 676-683 (2011)Data Deduplication System for Supporting Multi-mode., , , , and . ACIIDS (1), volume 6591 of Lecture Notes in Computer Science, page 78-87. Springer, (2011)VCPU Shaping for Supporting Latency Sensitive Workloads., , and . FGIT, volume 7709 of Lecture Notes in Computer Science, page 25-32. Springer, (2012)Multimedia file forensics system exploiting file similarity search., , and . Multimedia Tools Appl., 78 (5): 5233-5254 (2019)Domain generalization for semantic segmentation: a survey., , , , and . Artif. Intell. Rev., 57 (9): 247 (September 2024)Low Overhead File Synchronization Mechanism., , , and . ICHIT (2), volume 310 of Communications in Computer and Information Science, page 725-729. Springer, (2012)Energy-efficient scheduling of a real-time task on DVFS-enabled multi-cores., , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 273-277. ACM, (2009)Delivering Augmented Information in a Session Initiation Protocol-Based Video Telephony Using Real-Time AR., and . J. Inf. Process. Syst., 18 (1): 1-11 (2022)Efficient Executable File Similarity Detection Scheme by Exploiting Executable Fingerprint., , , and . ICMLSC, page 93-97. ACM, (2017)