Author of the publication

A Survey of Energy-Efficient Compression and Communication Techniques for Multimedia in Resource Constrained Systems.

, , , and . IEEE Communications Surveys and Tutorials, 15 (3): 963-972 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive approach for image encryption and secure transmission over multirate wireless sensor networks., , , and . Wireless Communications and Mobile Computing, 9 (3): 383-393 (2009)Low-complexity image coder/decoder with an approaching-entropy quad-tree search code for embedded computing platforms., , , , and . ICIP, page 297-300. IEEE, (2011)A stochastic biometric authentication scheme using uniformed GMM in wireless body area sensor networks., , , , , and . PIMRC, page 1620-1624. IEEE, (2010)Hierarchical Character Oriented Wildlife Species Recognition Through Heterogeneous Wireless Sensor Networks., , , , and . PIMRC, page 1-5. IEEE, (2007)Component-based Multirate Image Transmission over Wireless Sensor Networks., , , and . PIMRC, page 1-5. IEEE, (2007)Performance Analysis of a Novel Low-Complexity High-Precision Timing Synchronization Method for Wireless Sensor Networks., , , , and . IEEE Trans. Wireless Communications, 13 (9): 4758-4765 (2014)Cross-layer multirate interaction with Distributed Source Coding in Wireless Sensor Networks., , , , and . IEEE Trans. Wireless Communications, 8 (2): 787-795 (2009)Position Based Unequal Error Protection for Image Transmission with Energy Constraint over Multirate XPD MIMO Sensor Networks., , , , , and . GLOBECOM, page 4730-4734. IEEE, (2008)Matching Stream Authentication and Resource Allocation to Multimedia Codec Dependency with Position-Value Partitioning in Wireless Multimedia Sensor Networks., , , , and . GLOBECOM, page 1-5. IEEE, (2009)Real-time audio steganography attack based on automatic objective quality feedback., , , and . Security and Communication Networks, 9 (8): 737-746 (2016)