Author of the publication

Block-based method for real-time compound video compression

, , , and . Proceedings of Mobile Multimedia/Image Processing, Security, and Applications 2010, volume 7708 of Presented at the Society of Photo-Optical Instrumentation Engineers (SPIE) Conference, page 77080S-77080S-8. Orlando, Florida, USA, (April 2010)
DOI: 10.1117/12.849169

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing multiuser diversity for efficient support of quality of service over a fading channel., and . IEEE Trans. Veh. Technol., 54 (3): 1198-1206 (2005)Multiple Content Dissemination in Roadside-Unit-Aided Vehicular Opportunistic Networks., , , and . IEEE Trans. Veh. Technol., 63 (8): 3947-3956 (2014)Socially aware D2D cooperative communications for enhancing Internet of Things application., , , , and . EURASIP J. Wireless Comm. and Networking, (2018)Tight bounds for the first order Marcum Q-function., and . Wirel. Commun. Mob. Comput., 12 (4): 293-301 (2012)Interest-Aware Joint Caching, Computing, and Communication Optimization for Mobile VR Delivery in MEC Networks., , , and . CoRR, (2024)Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-supervised Neural Networks., , , , and . SecureComm (1), volume 335 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 481-502. Springer, (2020)Terminal-Edge-Cloud Collaboration: An Enabling Technology for Robust Multimedia Streaming., , , , and . MSN, page 427-434. IEEE, (2020)Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks., , , and . BIBE, page 914-921. IEEE Computer Society, (2007)Adaptive Adversarial Attack on Scene Text Recognition., , , and . INFOCOM Workshops, page 358-363. IEEE, (2020)Optimal Mode Selection in Internet Video Communication: An End-To-End Approach., , , and . ICC (1), page 264-271. IEEE, (2000)