Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a fractal approach to hadronization: evidence for stability, stationarity and scaling in hadron-production processes. Physica A: Statistical Mechanics and its Applications, 338 (1-2): 36--43 (Jul 1, 2004)Visual salience and stack extension based ghost removal for high-dynamic-range imaging., , and . ICIP, page 2244-2248. IEEE, (2017)User-Controlled Security Mechanism in Data-Centric Clouds., , , and . HPCC/CSS/ICESS, page 647-653. IEEE, (2015)Improving Model Drift for Robust Object Tracking., , , , , and . CoRR, (2019)A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation., , , and . Trustcom/BigDataSE/ISPA, page 451-457. IEEE, (2016)A 41 mW VGA@30 fps Quadtree Video Encoder for Video Surveillance Systems., , , , , and . IEICE Trans. Electron., 91-C (4): 449-456 (2008)Multi-task learning for segmentation and classification of tumors in 3D automated breast ultrasound images., , , , , , , and . Medical Image Anal., (2021)Efficient personalized search over encrypted data for mobile edge-assisted cloud storage., , , , , and . Comput. Commun., (2021)An optimization framework for adjoint-based climate simulations: A case study of the Zebiak-Cane model., , , , and . Int. J. High Perform. Comput. Appl., 28 (2): 174-182 (2014)A secure self-destructing scheme for electronic data., , and . J. Comput. Syst. Sci., 79 (2): 279-290 (2013)