Author of the publication

A rate-distortion optimization model for SVC inter-layer encoding and bitstream extraction.

, , , , and . J. Vis. Commun. Image Represent., 19 (8): 543-557 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TouchAble: a camera-based multitouch system., , and . SenSys, page 405-406. ACM, (2010)Protecting Browsers from Network Intermediaries.. Carnegie Mellon University, USA, (2014)A rate-distortion optimization model for SVC inter-layer encoding and bitstream extraction., , , , and . J. Vis. Commun. Image Represent., 19 (8): 543-557 (2008)Trickle: Resilient Real-Time Video Multicasting for Dynamic Peers with Limited or Asymmetric Network Connectivity., , , , , and . ISM, page 391-398. IEEE Computer Society, (2006)All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API., , , , , and . IEEE Symposium on Security and Privacy, page 34-48. IEEE Computer Society, (2014)Protecting browsers from cross-origin CSS attacks., , , and . ACM Conference on Computer and Communications Security, page 619-629. ACM, (2010)The Case for Prefetching and Prevalidating TLS Server Certificates., , , , and . NDSS, The Internet Society, (2012)Darwin: a ground truth agnostic CAPTCHA generator using evolutionary algorithm., , , and . GECCO (Companion), page 165-166. ACM, (2014)Analyzing Forged SSL Certificates in the Wild., , , and . IEEE Symposium on Security and Privacy, page 83-97. IEEE Computer Society, (2014)Clickjacking: Attacks and Defenses., , , , and . USENIX Security Symposium, page 413-428. USENIX Association, (2012)