Author of the publication

Latent variable pictorial structure for human pose estimation on depth images.

, , , and . Neurocomputing, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

K-Means on Commodity GPUs with CUDA., , , , and . CSIE (3), page 651-655. IEEE Computer Society, (2009)Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , and . IAS, page 3-8. IEEE Computer Society, (2007)A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , and . SEC, volume 214 of IFIP Conference Proceedings, page 239-250. Kluwer, (2002)Label propagation based evolutionary clustering for detecting overlapping and non-overlapping communities in dynamic networks., , , , , and . Knowl.-Based Syst., (2015)Utility function of TCP Reno under precise end-to-end drop probability., , and . SCIENCE CHINA Information Sciences, 56 (1): 1-6 (2013)A formal semantics for debugging synchronous message passing-based concurrent programs., , and . SCIENCE CHINA Information Sciences, 57 (12): 1-18 (2014)Design and Implementation of Portable Multifunctional Data Acquisition Terminal., , , and . HPCC/EUC, page 1733-1738. IEEE, (2013)An algorithm for overlapping community detection in complex network., , , , , and . FSKD, page 732-738. IEEE, (2015)A Directional-Edge-Based Real-Time Object Tracking System Employing Multiple Candidate-Location Generation., , , and . IEEE Trans. Circuits Syst. Video Techn., 23 (3): 503-517 (2013)Energy efficient sequential sensing in multi-user cognitive ad hoc networks: A consideration of an ADC device., , and . Journal of Communications and Networks, 14 (2): 188-194 (2012)