Author of the publication

Research on Shadow Map Based Shadow Generation.

, , , and . Edutainment, volume 6249 of Lecture Notes in Computer Science, page 529-540. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guanxi in the Chinese Web., , and . CSE (4), page 9-17. IEEE Computer Society, (2009)Simplifying complex CAD geometry with conservative bounding contours., , and . ICRA, page 2503-2508. IEEE, (1997)On Designing a Flexible E-Payment System with Fraud Detection Capability., , and . CEC, page 236-243. IEEE Computer Society, (2004)An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs., , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 315-328. Springer, (2014)An(other) Exercise in Measuring the Strength of Source Code Obfuscation., , , and . DEXA Workshops, page 313-317. IEEE Computer Society, (2014)HealthEdge: Task scheduling for edge computing with health emergency and human behavior consideration in smart homes., , , , and . BigData, page 1213-1222. IEEE Computer Society, (2017)Shape-induced ultrahigh magnetic anisotropy and ferromagnetic resonance frequency of micropatterned thin Permalloy films, , , , and . Journal of Applied Physics, (2006)Integrated solenoid inductors with patterned, sputter-deposited Cr/Fe/sub 10/Co/sub 90//Cr ferromagnetic cores, , , , and . IEEE Electron Device Letters, 24 (4): 224-226 (April 2003)Permeability and Resonance Frequency of Patterned Magnetic Thin Films, , , and . (2001)Online Feature Transformation Learning for Cross-Domain Object Category Recognition., , , and . IEEE Trans. Neural Netw. Learning Syst., 29 (7): 2857-2871 (2018)