From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Motion Re-Estimation With Rate-Distortion Optimization for MPEG-2 to H.264/AVC Transcoding., и . IEEE Trans. Circuits Syst. Video Techn., 20 (2): 262-274 (2010)Fast block size prediction for MPEG-2 to H.264/AVC transcoding., , и . ICASSP, стр. 1029-1032. IEEE, (2008)Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications., , и . ISC, том 9290 из Lecture Notes in Computer Science, стр. 548-567. Springer, (2015)On the Power of Public-key Function-Private Functional Encryption., , и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 585-593. (2016)Bit-rate estimation for bit-rate reduction H.264/AVC video transcoding in wireless networks., , , и . ISWPC, стр. 464-467. IEEE, (2008)Making Any Identity-Based Encryption Accountable, Efficiently., и . ESORICS (1), том 9326 из Lecture Notes in Computer Science, стр. 326-346. Springer, (2015)Making Public Key Functional Encryption Function Private, Distributively., и . Public Key Cryptography (2), том 10770 из Lecture Notes in Computer Science, стр. 218-244. Springer, (2018)Multi-input Laconic Function Evaluation., , , и . ACISP, том 12248 из Lecture Notes in Computer Science, стр. 369-388. Springer, (2020)A Supervised Spatio-Temporal Contrastive Learning Framework with Optimal Skeleton Subgraph Topology for Human Action Recognition., , , , , , и . ICONIP (10), том 1964 из Communications in Computer and Information Science, стр. 162-175. Springer, (2023)Cliptography: Clipping the Power of Kleptographic Attacks., , , и . ASIACRYPT (2), том 10032 из Lecture Notes in Computer Science, стр. 34-64. (2016)