Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fingerprint-based user authentication scheme for multimedia systems., and . ICME, page 935-938. IEEE Computer Society, (2004)On the security of ID-based password authentication scheme using smart cards and fingerprints., , , and . ITRE, page 230-232. IEEE, (2005)Disocclusion using depth reliability map for view synthesis., , , and . ICASSP, page 1449-1452. IEEE, (2012)An efficient depth image-based rendering with depth reliability maps for view synthesis., , , and . J. Visual Communication and Image Representation, (2016)Image segmentation via grabcut and linear multi-scale smoothing., , and . ICCIP, page 474-478. ACM, (2017)K-directory community: Reliable service discovery in MANET., , , , , and . Pervasive and Mobile Computing, 7 (1): 140-158 (2011)An efficient region of interest support in scalable multi-view video coding., , , , and . IEEE Trans. Consumer Electronics, 57 (3): 1271-1279 (2011)Lightweight support for the evolution of software design and development artifacts., and . ICSM, page 474-475. IEEE Computer Society, (2008)LASEC: A Localized Approach to Service Composition in Pervasive Computing Environments., , , , and . IEEE Trans. Parallel Distrib. Syst., 26 (7): 1948-1957 (2015)A flexible biometrics remote user authentication scheme., and . Computer Standards & Interfaces, 27 (1): 19-23 (2004)