Author of the publication

Efficient Recursive Multichannel Blind Image Restoration.

, , and . EURASIP J. Adv. Signal Process., (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Students performance modeling based on behavior pattern., , , , , and . J. Ambient Intelligence and Humanized Computing, 9 (5): 1659-1670 (2018)The Contribution of the Inferior Parietal Lobe to Auditory Spatial Working Memory., , and . J. Cognitive Neuroscience, 20 (2): 285-295 (2008)The YouTube video recommendation system., , , , , , , , , and 1 other author(s). RecSys, page 293-296. ACM, (2010)Study on China-Laos Forestry Cross-Border Cooperation Strategy Model.. CCTA, volume 509 of IFIP Advances in Information and Communication Technology, page 396-405. Springer, (2016)DaVe: Offloading Delay-Tolerant Data Traffic to Connected Vehicle Networks., , , , and . IEEE Trans. Vehicular Technology, 65 (6): 3941-3953 (2016)Hierarchical Classification of Real Life Documents., , and . SDM, page 1-16. SIAM, (2001)An End-to-End Steel Surface Defect Detection Approach via Fusing Multiple Hierarchical Features., , , and . IEEE Trans. Instrumentation and Measurement, 69 (4): 1493-1504 (2020)Using improved particle swarm optimization to tune PID controllers in cooperative collision avoidance systems., , , , and . Frontiers Inf. Technol. Electron. Eng., 18 (9): 1385-1395 (2017)Accuracy Analysis of the Two-Reference-Node Angle-of-Arrival Localization System., , and . IEEE Wirel. Commun. Lett., 4 (3): 329-332 (2015)Secure Searchable Public-Key Encryption for Cloud Storage., , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 184-195. Springer, (2016)