Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Spam on Twitter via Message-Passing Based on Retweet-Relation., , , , and . TAAI, volume 8916 of Lecture Notes in Computer Science, page 56-65. Springer, (2014)Automatic Key Posture Selection for Human Behavior Analysis., , , and . MMSP, page 1-4. IEEE, (2005)Narrative Generation by Repurposing Digital Videos., , , and . MMM (1), volume 6523 of Lecture Notes in Computer Science, page 503-513. Springer, (2011)Dynamic visual saliency modeling based on spatiotemporal analysis., , , , and . ICME, page 1085-1088. IEEE Computer Society, (2008)A framework of spatio-temporal analysis for video surveillance., , , , and . ISCAS, page 2745-2748. IEEE, (2008)Wavelet-Based Off-Line Handwritten Signature Verification., , , and . Comput. Vis. Image Underst., 76 (3): 173-190 (1999)Real-Time Vehicle Tracking on a Highway., , , , and . J. Inf. Sci. Eng., 21 (4): 733-752 (2005)Background Modeling Using Phase Space for Day and Night Video Surveillance Systems., , , and . PCM (1), volume 3331 of Lecture Notes in Computer Science, page 206-213. Springer, (2004)Seethevoice: Learning from Music to Visual Storytelling of Shots., , , , , , and . ICME, page 1-6. IEEE Computer Society, (2018)3-D structure modeling via constraint resolution., and . ICTAI, page 274-281. IEEE Computer Society, (1991)