Author of the publication

Efficient Large-Scale Structure From Motion by Fusing Auxiliary Imaging Information.

, , , and . IEEE Trans. Image Processing, 24 (11): 3561-3573 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rat Grooming Behavior Detection with Two-stream Convolutional Networks., , and . IPTA, page 1-5. IEEE, (2019)Chameleon Hashes Without Key Exposure Based on Factoring., , and . J. Comput. Sci. Technol., 22 (1): 109-113 (2007)Performance implications of non-uniform VCPU-PCPU mapping in virtualization environment., , , , and . Cluster Computing, 16 (3): 347-358 (2013)Performance enhancement of a WCDMA/HSDPA+ receiver via minimizing error vector magnitude., and . ITC, page 1-7. IEEE Computer Society, (2013)Adaptive Contour Features in oriented granular space for human detection and segmentation., , and . CVPR, page 1786-1793. IEEE Computer Society, (2009)Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs., , , and . TrustCom, page 795-802. IEEE Computer Society, (2014)To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks., , , and . IEEE Trans. Dependable Sec. Comput., 10 (3): 168-182 (2013)On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks., , , and . IEEE Trans. Mob. Comput., 12 (1): 151-165 (2013)On Generic Construction for Private Designated Verifier Signatures., , and . CIS, page 497-499. IEEE Computer Society, (2012)Win-Coupon: An incentive framework for 3G traffic offloading., , , and . ICNP, page 206-215. IEEE Computer Society, (2011)