Author of the publication

A General Two-Dimensional Hidden Markov Model and its Application in Image Classification.

, , and . ICIP (6), page 41-44. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Randomized Parallel Three-Dimensional Convex Hull Algorithm for Coarse-Grained Multicomputers., , , , and . Theory Comput. Syst., 30 (6): 547-558 (1997)Scalable geometric hashing on MasPar machines., , and . CVPR, page 594-595. IEEE, (1993)RapidIO traffic management and flow arbitration protocol., , and . IEEE Communications Magazine, 44 (7): 45-52 (2006)New detector for spread-spectrum based image watermarking using underdetermined ICA., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721Y. SPIE, (2006)Efficient tracking of cyclic human motion by component motion., , and . IEEE Signal Process. Lett., 11 (12): 941-944 (2004)Transform domain inter-block interleaving schemes for robust image and video transmission in ATM networks., , and . J. Vis. Commun. Image Represent., 15 (4): 522-547 (2004)Emerging Technologies for Connected and Smart Vehicles., , , , , , and . IEEE Commun. Mag., 56 (10): 20-21 (2018)Multiple Sequence Alignment System for Pyrosequencing Reads., , , and . BICoB, volume 5462 of Lecture Notes in Computer Science, page 362-375. Springer, (2009)Identifying IP Usage Scenarios: Problems, Data, and Benchmarks., , , , , and . IEEE Netw., 36 (3): 152-158 (2022)A comprehensive 3-dimensional security analysis of a controller in software-defined networking., , and . Secur. Priv., (2018)