Author of the publication

BaSSL: Boundary-aware Self-Supervised Learning for Video Scene Segmentation.

, , , , , , and . ACCV (4), volume 13844 of Lecture Notes in Computer Science, page 485-501. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 16Gb 1.2V 3.2Gb/s/pin DDR4 SDRAM with improved power distribution and repair strategy., , , , , , , , , and 15 other author(s). ISSCC, page 212-214. IEEE, (2018)Two Alternative Registration and Paging Schemes for Supporting Idle Mode in IEEE 802.16e Wireless MAN., , , , and . VTC Fall, page 1-5. IEEE, (2006)WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream., and . IEEE Trans. Dependable Secur. Comput., 10 (3): 183-195 (2013)Data quality and firm performance: empirical evidence from the Korean financial industry., , and . Inf. Technol. Manag., 14 (1): 59-65 (2013)Localization with a Mobile Beacon in Underwater Acoustic Sensor Networks., and . Sensors, 12 (5): 5486-5501 (2012)Route Optimization with Additional Destination-Information in Mobile Networks., , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 286-295. Springer, (2007)A Lag Effect of IT Investment on Firm Performance., and . IRMJ, 19 (1): 43-69 (2006)A simple, scalable, and stable explicit rate allocation algorithm for MAX-MIN flow control with minimum rate guarantee., , and . IEEE/ACM Trans. Netw., 9 (3): 322-335 (2001)Redistributing time-based rights between consumer devices for content sharing in DRM system., , and . Int. J. Inf. Sec., 8 (4): 263-273 (2009)Leaking Uninitialized Secure Enclave Memory via Structure Padding (Extended Abstract)., and . CoRR, (2017)