Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VANET-based Secure Value-Added Services., and . SocialCom, page 6:1-6:4. ACM, (2014)Entropy thresholding and its parallel algorithm on the reconfigurable array of processors with wider bus networks., , and . IEEE Trans. Image Processing, 8 (9): 1229-1242 (1999)A Novel Blind Watermarking Using Hybrid Embedding Technique., , and . ICA3PP, volume 5574 of Lecture Notes in Computer Science, page 175-181. Springer, (2009)Mining Linguistic Mobility Patterns for Wireless Networks., , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1352-1358. Springer, (2005)Locality sensitive hashing for sampling-based algorithms in association rule mining., , and . Expert Syst. Appl., 38 (10): 12388-12397 (2011)Data Hiding Using Flexible Multi-bit MER., , , and . ISBAST, page 24-31. IEEE, (2013)Parallel algorithms for arbitrary dimensional Euclidean distance transforms with applications on arrays with reconfigurable optical buses., and . IEEE Trans. Syst. Man Cybern. Part B, 34 (1): 517-532 (2004)On the design of secure group-oriented communication channels in Internet environments., and . PIMRC, page 1243-1247. (1996)Medial Axis Transform on Mesh-Connected Computers with Hyperbus Broadcasting., and . Computing, 59 (2): 95-114 (1997)An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization., , , , , and . IEEE Trans. Multim., 10 (5): 746-757 (2008)