Author of the publication

C3P: Cross-Domain Pose Prior Propagation for Weakly Supervised 3D Human Pose Estimation.

, , , , , and . ECCV (5), volume 13665 of Lecture Notes in Computer Science, page 554-571. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Human-Robot Interaction by Understanding Upper Body Gestures., , , , and . Presence, 23 (2): 133-154 (2014)A survey of error-correction methods for next-generation sequencing, , and . Briefings in Bioinformatics, (2012)A necessary condition for Schur stability of 2D polynomials digital filters., , and . ISCAS (3), page 439-442. IEEE, (1999)Fault Diagnosis Using a Joint Model Based on Sparse Representation and SVM., , , and . IEEE Trans. Instrumentation and Measurement, 65 (10): 2313-2320 (2016)Monitoring data dependencies in concurrent process execution through delta-enabled grid services., , , and . IJWGS, 5 (1): 85-106 (2009)VoIP over WLAN: voice capacity, admission control, QoS, and MAC: Research Articles, , , and . Int. J. Commun. Syst., 19 (4): 491--508 (2006)Scalable collaborative filtering using incremental update and local link prediction., , and . CIKM, page 2371-2374. ACM, (2012)A Cross-Chain System Supports Verifiable Complete Data Provenance Queries., , , and . ICA3PP (3), volume 14489 of Lecture Notes in Computer Science, page 230-249. Springer, (2023)An Adaptive Grasping Strategy for Dexterous Hands Based on Proximity-Contact Sensing., , , and . ICARM, page 1181-1186. IEEE, (2023)VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis., , , , , , , and . ICSME, page 329-339. IEEE, (2022)