Author of the publication

Temporal error concealment using quad-tree prediction and coherency sensitive hashing for HEVC.

, , , , , and . J. Electronic Imaging, 27 (03): 033039 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time delay estimation of HF fading signal in impulsive noise environments., , and . WOCC, page 204-208. IEEE, (2013)Security Requirements Engineering in the Wild: A Survey of Common Practices., , , and . COMPSAC, page 314-319. IEEE Computer Society, (2011)Negotiating Service Requirements among Strategic Actors., , , and . COMPSAC Workshops, page 31-36. IEEE Computer Society, (2010)Integration of a Novel Neural Network Algorithm and Kirkpatrick Model and Its Application in R&D Performance Evaluation., , , and . CSSE (1), page 353-356. IEEE Computer Society, (2008)Performance Analysis of Co- and Cross-tier Device-to-Device Communication Underlaying Macro-small Cell Wireless Networks., , , , and . TIIS, 10 (4): 1481-1500 (2016)LinSched: The Linux Scheduler Simulator., , , , and . ISCA PDCCS, page 171-176. ISCA, (2008)Temporal error concealment using quad-tree prediction and coherency sensitive hashing for HEVC., , , , , and . J. Electronic Imaging, 27 (03): 033039 (2018)A Self-Supervised Learning Manipulator Grasping Approach Based on Instance Segmentation., , , , and . IEEE Access, (2018)Throughput Improvement in Cellular Networks via Full-Duplex Based Device-to-Device Communications., , , , and . IEEE Access, (2016)Differentially private Naive Bayes learning over multiple data sources., , , , and . Inf. Sci., (2018)