Author of the publication

Isotropic Mesh Simplification by Evolving the Geodesic Delaunay Triangulation.

, , , , , and . ISVD, page 39-47. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel Chen-Han (PCH) Algorithm for Discrete Geodesics, , and . CoRR, (2013)Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS)., , , and . EMBC, page 3454-3457. IEEE, (2019)Revisiting Ellsberg's and Machina's Paradoxes: A Two-Stage Evaluation Model Under Ambiguity.. Manag. Sci., 67 (11): 6897-6914 (2021)Human Motion Capture Data Tailored Transform Coding., , , and . IEEE Trans. Vis. Comput. Graph., 21 (7): 848-859 (2015)Posttranslational regulation impacts the fate of duplicated genes, , , , , and . Proceedings of the National Academy of Sciences, 107 (7): 2967--2971 (Feb 16, 2010)The Duality of Geodesic Voronoi/Delaunay Diagrams For An Intrinsic Discrete Laplace-Beltrami Operator on Simplicial Surfaces., , , and . CCCG, Carleton University, Ottawa, Canada, (2014)Integration of Networking, Caching, and Computing in Wireless Systems: A Survey, Some Research Issues, and Challenges., , , , and . IEEE Commun. Surv. Tutorials, 20 (1): 7-38 (2018)Learning Kullback-Leibler Divergence-Based Gaussian Model for Multivariate Time Series Classification., , , , , and . IEEE Access, (2019)A Study on Acceptance of Educational Games for the Students in the Stage of Compulsory Education., , , , and . ICBL, volume 11546 of Lecture Notes in Computer Science, page 316-326. Springer, (2019)Security Visualization: Detecting Denial of Service., , , and . INISCOM, volume 188 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 39-49. (2016)