Author of the publication

Panorama to cube: a content-aware representation method.

, , , , , and . SIGGRAPH Asia Technical Briefs, page 6:1-6:4. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Imbalance-Aware Self-supervised Learning for 3D Radiomic Representations., , , , , , , and . MICCAI (2), volume 12902 of Lecture Notes in Computer Science, page 36-46. Springer, (2021)Cooling a micromechanical resonator by quantum back-action from a noisy qubit, , , , and . Physical Review B, 80 (14): 144508+ (October 2009)Demonstration abstract: a MEMS-based airflow sensor network., , , , , and . IPSN, page 321-322. IEEE/ACM, (2014)VPRSM Approach to WEB Searching., and . Rough Sets and Current Trends in Computing, volume 2475 of Lecture Notes in Computer Science, page 514-521. Springer, (2002)Mitigation Techniques of Channel Collisions in the TTFR-based Asynchronous Spectral Phase-Encoded Time-Spreading (SPECTS) Optical CDMA System., , , and . ICC, page 2636-2641. IEEE, (2006)Perceptual enhancement for stereoscopic videos based on horopter consistency., , , , , and . VRST, page 15-18. ACM, (2016)Packet loss in video transfers over IP networks., , and . ISCAS (2), page 345-348. IEEE, (2001)Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks., , , and . CRITIS, volume 5508 of Lecture Notes in Computer Science, page 144-154. Springer, (2008)Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy., , , , , and . KSII Trans. Internet Inf. Syst., 11 (10): 5039-5061 (2017)A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value., , , , , and . KSII Trans. Internet Inf. Syst., 14 (9): 3615-3638 (2020)