Author of the publication

Novel temporal domain hole filling based on background modeling for view synthesis.

, , , , and . ICIP, page 2721-2724. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Hypergraph Representation on Face Anti-spoofing Beyond 2D Attacks., , , , and . CoRR, (2018)Multi-view Knowledge Graph Embedding for Entity Alignment., , , , , and . IJCAI, page 5429-5435. ijcai.org, (2019)A Convergence Analysis of Gradient Descent for Deep Linear Neural Networks., , , and . ICLR (Poster), OpenReview.net, (2019)A Method for Detecting Surface Defects in Insulators Based on RPCA., , , and . ICIG (2), volume 10667 of Lecture Notes in Computer Science, page 163-173. Springer, (2017)A Multi-Interval Homotopy Analysis Method Using Multi-Objective Optimization for Analytically Analyzing Chaotic Dynamics in Memristive Circuit., , , and . IEEE Access, (2019)Comparison Between the Methods of Adjustment and Constant Stimuli for the Estimation of Redirection Detection Thresholds., , , , and . EuroVR, volume 11883 of Lecture Notes in Computer Science, page 226-245. Springer, (2019)Fall perception for elderly care: A fall detection algorithm in Smart Wristlet mHealth system., , , , and . ICC, page 4270-4274. IEEE, (2014)Controllable formation and optical characterization of silicon nanocone-forest using SF6/C4F8 in cyclic etching-passivation process., , , and . NEMS, page 1034-1037. IEEE, (2013)Trust constrained workflow scheduling in cloud computing., , , and . SMC, page 164-169. IEEE, (2017)HIGCALS: a hierarchical graph-theoretic clustering active learning system., and . SMC, page 3895-3900. IEEE, (2006)