Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing and Communication Cost-Aware Service Migration Enabled by Transfer Reinforcement Learning for Dynamic Vehicular Edge Computing Networks., , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 257-269 (January 2024)Interactive key frame selection model., , and . J. Vis. Commun. Image Represent., 17 (6): 1145-1163 (2006)Improved latent concept expansion using hierarchical markov random fields., , , and . CIKM, page 249-258. ACM, (2010)A pivot-based filtering algorithm for enhancing query performance of LSH., , , , and . VCIP, page 1-4. IEEE, (2011)Data-oriented locality sensitive hashing., , , and . ACM Multimedia, page 1131-1134. ACM, (2010)ID-Binary Tree Stack Anticollision Algorithm for RFID., , , and . ISCC, page 207-212. IEEE Computer Society, (2006)A Generic Framework for Semantic Sports Video Analysis Using Dynamic Bayesian Networks., , , and . MMM, page 115-122. IEEE Computer Society, (2005)Dynamic bayesian network based event detection for soccer highlight extraction., , , and . ICIP, page 633-636. IEEE, (2004)Replay Scene Based Sports Video Abstraction., , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 689-697. Springer, (2005)Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication., , and . J. Comput. Sci. Technol., 22 (4): 618-625 (2007)