Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on Secure Chip for Message Authentication between a Smart Meter and Home Appliances in Smart Grid., , , , and . ICITCS, page 1-3. IEEE Computer Society, (2013)A Study on the Information Protection Modules for Secure Mobile Payments., , , , and . ICITCS, page 1-2. IEEE Computer Society, (2013)A Stereo Matching Using Variable Windows and Dynamic Programming., , and . Australian Conference on Artificial Intelligence, volume 3809 of Lecture Notes in Computer Science, page 1277-1280. Springer, (2005)GPU Implementation of a Clustering Based Image Registration., , , and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 491-497. Springer, (2008)A Study on the Effective Communication Protocol of the Surface Inspection Rail Robot that it can be a Self-checking., , , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 484-489. Springer, (2016)Autonomous human tracking of multiple robotic lamps., , , , and . ICRA, page 3567-3572. IEEE, (2012)Digital IDEA's VFX work., , , , , , , , and . SIGGRAPH ASIA (Computer Animation Festival), page 54:1. ACM, (2010)A smart card based user authentication scheme for multi-server environment., , and . ICUIMC, page 117. ACM, (2011)Modified Hough Transform for Images Containing Many Textured Regions., , and . RSCTC, volume 4259 of Lecture Notes in Computer Science, page 824-833. Springer, (2006)A straight line detection using principal component analysis, , and . Pattern Recognition Letters (PATREC), 27 (14): 1744-1754 (2006)