Author of the publication

Video summarization by video structure analysis and graph optimization

, , and . roceedings of the 2004 IEEE International Conference on Multimedia and Expo, ICME 2004, Taipei, Taiwan, page 1959-1962. (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QoS Prediction in Cloud and Service Computing - Approaches and Applications, and . Springer Briefs in Computer Science Springer, (2017)A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation., , and . IEEE Trans. Circuits Syst. Video Techn., 15 (12): 1638-1649 (2005)High-Resolution Deep Convolutional Generative Adversarial Networks, , , , and . (2017)cite arxiv:1711.06491.Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones., , and . SOUPS, page 187-198. USENIX Association, (2014)Affinity rank: a new scheme for efficient web search., , , , and . WWW (Alternate Track Papers & Posters), page 338-339. ACM, (2004)Automatic string test data generation for detecting domain errors., , and . Softw. Test. Verification Reliab., 20 (3): 209-236 (2010)Reliability-oriented software engineering: design, testing, and evaluation techniques.. IEE Proc. Softw., 145 (6): 191-197 (1998)A New Learning Algorithm for Function Approximation Incorporating A Priori Information into Extreme Learning Machine., , and . ISNN (1), volume 3971 of Lecture Notes in Computer Science, page 631-636. Springer, (2006)Nonlinear Blind Source Separation Using Hybrid Neural Networks., , , and . ISNN (1), volume 3971 of Lecture Notes in Computer Science, page 1165-1170. Springer, (2006)A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code., and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 202-213. Springer, (2003)