Author of the publication

Hardware-based JPEG 2000 video coding system.

, and . Real-Time Image Processing, volume 6496 of SPIE Proceedings, page 64960G. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Editorial., , and . Mathematics and Computers in Simulation, 62 (3-6): 217-218 (2003)An evaluation of adaptive numerical integration algorithms on parallel systems., and . Parallel Algorithms Appl., 18 (1-2): 27-47 (2003)Workshop on Parallel and Distributed Computing in Image Processing, Video Processing, and Multimedia (PDIVM 2000)., and . IPDPS Workshops, volume 1800 of Lecture Notes in Computer Science, page 161-162. Springer, (2000)Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems., and . ICIAR (2), volume 6112 of Lecture Notes in Computer Science, page 296-305. Springer, (2010)Hardware and Software Aspects for 3-D Wavelet Decomposition on Shared Memory MIMD Computers., and . ACPC, volume 1557 of Lecture Notes in Computer Science, page 347-356. Springer, (1999)Parallel Computation of Optimal Parameters for Pseudo Random Number Generation., and . ACPC, volume 1127 of Lecture Notes in Computer Science, page 78-89. Springer, (1996)Dual-Resolution Active Contours Segmentation of Vickers Indentation Images with Shape Prior Initialization., and . ICISP, volume 7340 of Lecture Notes in Computer Science, page 362-369. Springer, (2012)Personal Recognition Using Single-Sensor Multimodal Hand Biometrics., and . ICISP, volume 5099 of Lecture Notes in Computer Science, page 396-404. Springer, (2008)A Novel Shape Feature Descriptor for the Classification of Polyps in HD Colonoscopy., , and . MCV, volume 8331 of Lecture Notes in Computer Science, page 205-213. Springer, (2013)Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations., and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 543-550. Springer, (2005)