Author of the publication

HDR video quality assessment: Perceptual evaluation of compressed HDR video.

, , , , , , and . J. Vis. Commun. Image Represent., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop., , , , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 458-466. Springer, (2015)Towards Data Isolation & Collaboration in Storage Cloud., , , , , and . APSCC, page 139-146. IEEE Computer Society, (2011)uSendfile: A User-Space Sendfile Verb Based on Flash and RDMA., , , and . CLOUD, page 465-469. IEEE, (2019)Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework., , , and . ICC, page 1-6. IEEE, (2018)Sift - An Efficient Method for Co-residency Detection on Amazon EC2., , , , , and . ICISSP, page 423-431. SciTePress, (2016)ADF2T: an Active Disk Failure Forecasting and Tolerance Software., , , , and . ISSRE Workshops, page 13-18. IEEE, (2020)Human-AI Collaboration: A Study on Anti-ChatGPT Strategies Employed in Innovative Practical Homework Towards Öne-Click-Answer" Issue in AIGC., , , , , , , , and . ICCSE (3), volume 2025 of Communications in Computer and Information Science, page 343-353. Springer, (2023)Intelligent Logistics Service Quality Assurance Mechanism Based on Federated Collaborative Cache in 5G+ Edge Computing Environment., , , , , , and . WiCON, volume 527 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 157-169. Springer, (2023)DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service., , , , and . ICISSP, page 146-156. SciTePress, (2016)Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine., , , , and . ICISSP, page 380-387. SciTePress, (2016)