Author of the publication

A robust fine granularity scalability using trellis based predictive leak.

, , and . ISCAS (3), page 401-404. IEEE, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermark optimization technique based on genetic algorithms., and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 516-523. SPIE, (2000)A heuristic approach for detecting RNA H-type pseudoknots., , and . Bioinform., 21 (17): 3501-3508 (2005)Cross-layer System Designs for Scalable Video Streaming over Mobile WiMAX., , , and . WCNC, page 1860-1864. IEEE, (2007)Toward T-Wave Recognition of ECG Signals Through Modulated Ensemble Empirical Mode Decomposition., and . Adv. Data Sci. Adapt. Anal., 13 (1): 2150002:1-2150002:29 (2021)An Intelligent Water Monitoring IoT System for Ecological Environment and Smart Cities., , , , , , , , , and . Sensors, 23 (20): 8540 (October 2023)A Virtual Reality Lower-Back Pain Rehabilitation Approach: System Design and User Acceptance Analysis., , , and . HCI (9), volume 9177 of Lecture Notes in Computer Science, page 374-382. Springer, (2015)Deep Reinforcement Learning-based Beam Tracking from mmWave Antennas Installed on Overhead Messenger Wires., , , , , , , and . VTC Fall, page 1-6. IEEE, (2020)Scalable Video Streaming over Mobile WiMAX., , , and . ISCAS, page 3463-3466. IEEE, (2007)Inpainting attacks against visible watermarking schemes., and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 376-384. SPIE, (2001)Digital invisible ink: revealing true secrets via attacking., , and . AsiaCCS, page 355. ACM, (2006)