Author of the publication

A Distributed Architecture for Multimedia File Storage, Analysis and Processing.

, , , , and . Intelligent Tools for Building a Scientific Information Platform, volume 467 of Studies in Computational Intelligence, Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication between End-users and Databases using Mobile Agent Technology., and . IMSA, page 433-436. IASTED/ACTA Press, (2001)The Data Collection Module of the Agent based Search System (Abss)., , , , and . WEBIST (1), page 451-454. INSTICC Press, (2007)Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities., , , , , and . MCSS, volume 1689 of Communications in Computer and Information Science, page 49-65. Springer, (2022)Workflow Management System with Automatic Correction., , , , , , , , , and 1 other author(s). MCSS, volume 1284 of Communications in Computer and Information Science, page 182-195. Springer, (2020)A Distributed Architecture for Multimedia File Storage, Analysis and Processing., , , , and . Intelligent Tools for Building a Scientific Information Platform, volume 467 of Studies in Computational Intelligence, Springer, (2013)Contour Extraction and Compression Scheme Utilizing Both the Transform and Spatial Image Domains., , and . MCSS, volume 785 of Communications in Computer and Information Science, page 1-15. Springer, (2017)A High-Capacity Annotation Watermarking Scheme., , , and . MCSS, volume 149 of Communications in Computer and Information Science, page 1-9. Springer, (2011)Reconfigurable self-embedding with high quality restoration under extensive tampering., and . ICIP, page 2193-2196. IEEE, (2012)A scheme for censorship of sensitive image content with high-quality reconstruction ability., , and . ICME, page 1073-1078. IEEE Computer Society, (2010)Real Data Performance Evaluation of CAISS Watermarking Scheme., , and . MCSS, volume 287 of Communications in Computer and Information Science, page 139-147. Springer, (2012)