Author of the publication

A Privacy Algorithm for 3D Human Body Scans.

, and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 870-877. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Implementation of the Uniform Authentication Based on Web Service., , , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 87-92. Springer, (2011)Traffic camera markup language (TCML)., , and . Visual Information Processing and Communication, volume 8305 of SPIE Proceedings, page 830510. SPIE, (2012)A Task Allocation Algorithm for Profit Maximization in NFC-RAN., , , , , and . IWCMC, page 203-207. IEEE, (2019)Visual Thinking for Ambient Intelligence.. AMIF, volume 1 of Ambient Intelligence and Smart Environments, page 7. IOS Press, (2008)A Privacy Algorithm for 3D Human Body Scans., and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 870-877. Springer, (2006)Interactive Visualization of Network Anomalous Events., and . ICCS (1), volume 5544 of Lecture Notes in Computer Science, page 450-459. Springer, (2009)BLIAM: Literature-based Data Synthesis for Synergistic Drug Combination Prediction., , , and . CoRR, (2023)Informedia @ TRECVID 2014., , , , , , , , , and 21 other author(s). TRECVID, National Institute of Standards and Technology (NIST), (2014)Activity Recognition from Sensor Fusion on Fireman's Helmet., , and . CISP-BMEI, page 1-6. IEEE, (2019)Pheromone Model Based Visualization of Malware Distribution Networks., , , , , and . ICCS (1), volume 10860 of Lecture Notes in Computer Science, page 55-68. Springer, (2018)