Author of the publication

Stable Pose Estimation with a Motion Model in Real-Time Application.

, , , and . ICME, page 314-319. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems., , , and . IEEE Access, (2016)Secure Client Side Watermarking with Limited Key Size., , and . MMM (1), volume 8935 of Lecture Notes in Computer Science, page 13-24. Springer, (2015)A Foveation-Based Rate Shaping Mechanism for MPEG Videos., and . IEEE Pacific Rim Conference on Multimedia, volume 2532 of Lecture Notes in Computer Science, page 485-492. Springer, (2002)Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques., , and . IWDW, volume 3304 of Lecture Notes in Computer Science, page 271-282. Springer, (2004)Information Delivery Systems for Car Passengers Without Networking Capabilities., , , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 539-548. Springer, (2007)High efficient distributed video coding with parallelized design for LDPCA decoding on CUDA based GPGPU., , and . J. Vis. Commun. Image Represent., 23 (1): 63-74 (2012)Two-dimensional polynomial residue number system., and . Signal Process., 40 (2-3): 295-306 (1994)Polynomial transform based algorithms for computing two-dimensional generalized DFT, generalized DHT, and skew circular convolution., and . Signal Process., 80 (10): 2255-2260 (2000)A multiprocessor system for visual communications using distributed transputer arrays., , and . Microprocess. Microsystems, 18 (2): 79-87 (1994)Unseen Visible Watermarking., , and . ICIP (3), page 261-264. IEEE, (2007)