Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Authentication Using Distributed Source Coding., , and . IEEE Trans. Image Processing, 21 (1): 273-283 (2012)Streaming to mobile users in a peer-to-peer network., , and . MobiMedia, ICST, (2009)Distributed rate allocation for video streaming over wireless networks with heterogeneous link speeds., and . IWCMC, page 296-301. ACM, (2007)Peer-assisted packet loss repair for IPTV video multicast., , , and . ACM Multimedia, page 401-410. ACM, (2009)Performance of a practical blind watermarking scheme., , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 594-605. SPIE, (2001)Planning and Evaluation of Reorienting Osteotomies of the Proximal Femur in Cases of SCFE Using Virtual Three-Dimensional Models., , , , , and . MICCAI, volume 1496 of Lecture Notes in Computer Science, page 1-8. Springer, (1998)Robust Low-Delay Video Transmission using H.264/AVC Redundant Slices and Flexible Macroblock Ordering., , , and . ICIP (4), page 93-96. IEEE, (2007)Rate-distortion optimized video streaming over Internet packet traces., and . ICIP (2), page 161-164. IEEE, (2005)Quality-controlled view interpolation for multiview video., , , , and . ICIP, page 1805-1808. IEEE, (2011)3-D Reconstruction of Real-World Objects Using Extended Voxels., , , and . ICIP, page 569-572. IEEE, (2000)