Author of the publication

Real time vanishing points detection on smartphones under Manhattan world assumption.

, , , , and . Pattern Recognition Letters, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Indirect All-to-All Personalized Communication on Rings and 2-D Tori.. J. Comput. Sci. Technol., 16 (5): 480-483 (2001)Automated Recognition of Sequential Patterns in Captured Motion Streams., , , and . WAIM, volume 6184 of Lecture Notes in Computer Science, page 250-261. Springer, (2010)An Efficient Fibonacci Series Based Hierarchical Application-Layer Multicast Protocol., , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 131-142. Springer, (2006)Automatical Pulmonary Nodule Detection by Feature Contrast Learning., , , , , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 45-53. Springer, (2019)Accelerating Reachability Analysis on Petri Net for Mutual Exclusion-Based Deadlock Detection., , and . IEICE Transactions, 99-D (12): 2978-2985 (2016)Real-time mocap dance recognition for an interactive dancing game., , , and . Journal of Visualization and Computer Animation, 22 (2-3): 229-237 (2011)A logical framework for modeling and reasoning about semantic web services contract., , , and . WWW, page 1057-1058. ACM, (2008)Enhancing the Anonymity in Information Diffusion Based on Obfuscated Coded Data., , , , and . IEEE Trans. Network Science and Engineering, 6 (4): 968-982 (2019)Optimal Design of Linear Network Coding for information theoretically secure unicast., , , , , and . INFOCOM, page 757-765. IEEE, (2011)Anonymous communication with network coding against traffic analysis attack., , , , and . INFOCOM, page 1008-1016. IEEE, (2011)