Author of the publication

Game-Theoretic Camera Selection Using Inference Tree Method for a Wireless Visual Sensor Network.

, , , and . IJDSN, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

D3: Recognizing dynamic scenes with deep dual descriptor based on key frames and key segments., , , and . Neurocomputing, (2018)Interactive MR game based on intelligent agent., , , and . Advances in Computer Entertainment Technology, volume 352 of ACM International Conference Proceeding Series, page 411. ACM, (2008)Easy humanoid motion generation from user demonstration using wearable interface., and . Advances in Computer Entertainment Technology, volume 352 of ACM International Conference Proceeding Series, page 151-154. ACM, (2008)A Weighted Fuzzy Min-Max Neural Network and Its Application to Feature Analysis., and . ICNC (3), volume 3612 of Lecture Notes in Computer Science, page 1178-1181. Springer, (2005)Robust Real-Time Face Detection Using Hybrid Neural Networks., , and . ICIC (3), volume 4115 of Lecture Notes in Computer Science, page 721-730. Springer, (2006)Game-Theoretic Camera Selection Using Inference Tree Method for a Wireless Visual Sensor Network., , , and . IJDSN, (2014)Impersonating-Resilient Dynamic Key Management for Large-Scale Wireless Sensor Networks., , and . IJDSN, (2013)Audio Fingerprinting Scheme by Temporal Filtering for Audio Identification Immune to Channel-Distortion., , , and . AIRS, volume 3689 of Lecture Notes in Computer Science, page 528-533. Springer, (2005)Hybrid Visual Tracking for Augmented Books., , , , and . ICEC, volume 5309 of Lecture Notes in Computer Science, page 161-166. Springer, (2008)Ghost Hunter: A Handheld Augmented Reality Game System with Dynamic Environment., , , , and . ICEC, volume 4740 of Lecture Notes in Computer Science, page 10-15. Springer, (2007)