Author of the publication

Digital Restoration of Historical Heritage by Reconstruction from Uncalibrated Images.

, , , , and . Edutainment, volume 3942 of Lecture Notes in Computer Science, page 1377-1382. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

M.Sc. Yunxuan Li University of Stuttgart

CV-Priv : Towards a Context Model for Privacy Policy Creation for Connected Vehicles, , and . 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), page 583-588. IEEE, (2023)
CV-Priv : Towards a Context Model for Privacy Policy Creation for Connected Vehicles, , and . 2023 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), page 583-588. IEEE, (2023)Privacy in Connected Vehicles: Perspectives of Drivers and Car Manufacturers, , , , and . Service-Oriented Computing : 17th Symposium and Summer School, SummerSOC 2023, Heraklion, Crete, Greece, June 25 – July 1, 2023, Revised Selected Papers, 1847, page 59-68. Cham, Springer, (2023)
 

Other publications of authors with the same name

ReviveNet: A Self-Adaptive Architecture for Improving Lifetime Reliability via Localized Timing Adaptation., , and . IEEE Trans. Computers, 60 (9): 1219-1232 (2011)An Efficient Evaluation and Vector Generation Method for Observability-Enhanced Statement Coverage., , , and . J. Comput. Sci. Technol., 20 (6): 875-884 (2005)Leakage Current Estimation of CMOS Circuit with Stack Effect., , , , and . J. Comput. Sci. Technol., 19 (5): 708-717 (2004)RISO: Enforce Noninterfered Performance With Relaxed Network-on-Chip Isolation in Many-Core Cloud Processors., , , , , and . IEEE Trans. VLSI Syst., 23 (12): 3053-3064 (2015)IVF: Characterizing the Vulnerability of Microprocessor Structures to Intermittent Faults., , and . IEEE Trans. VLSI Syst., 20 (5): 777-790 (2012)A new certificateless authenticated key agreement protocol for SIP with different KGCs., , and . Security and Communication Networks, 6 (5): 631-643 (2013)Abstraction-Guided Simulation Using Markov Analysis for Functional Verification., , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 35 (2): 285-297 (2016)Enabling Near-Threshold Voltage(NTV) operation in Multi-VDD cache for power reduction., , , and . ISCAS, page 337-340. IEEE, (2013)A study on visual attention modeling - A linear regression method based on EEG., , , , and . IJCNN, page 1-6. IEEE, (2013)Response Compaction for Test Time and Test Pins Reduction Based on Advanced Convolutional Codes., , , , and . DFT, page 298-305. IEEE Computer Society, (2004)