Chaoguang Men

Orcid: 0000-0003-0659-2759

According to our database1, Chaoguang Men authored at least 29 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Roof Reconstruction of Aerial Point Cloud Based on BPPM Plane Segmentation and Energy Optimization.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

2022
Double Propagation Stereo Matching for Urban 3-D Reconstruction From Satellite Imagery.
IEEE Trans. Geosci. Remote. Sens., 2022

2021
Remote-Sensing Image Tile-Level Annotation Based on Discriminative Features and Expressive Visual Word Descriptors.
Sci. Program., 2021

2020
Superpixels extracted via region fusion with boundary constraint.
J. Vis. Commun. Image Represent., 2020

2018
Application of WINDLX Simulator in Teaching Practice to Solve the Structural and Control Related in the Pipeline.
Proceedings of the e-Learning, e-Education, and Online Training, 2018

2016
Accurate Dense Stereo Matching Based on Image Segmentation Using an Adaptive Multi-Cost Approach.
Symmetry, 2016

A Credit-Based Congestion-Aware Incentive Scheme for DTNs.
Inf., 2016

2015
High-capacity reversible watermarking scheme of 2D-vector data.
Signal Image Video Process., 2015

2014
A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates.
Comput. Aided Des., 2014

Access-Pattern Aware Checkpointing Data Storage Scheme for Mobile Computing Environment.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2013
Nonlinear scrambling-based reversible watermarking for 2D-vector maps.
Vis. Comput., 2013

Reversible fragile watermarking for locating tampered blocks in 2D vector maps.
Multim. Tools Appl., 2013

A recursive embedding algorithm towards lossless 2D vector map watermarking.
Digit. Signal Process., 2013

2012
Reversible fragile watermarking for 2-D vector map authentication with localization.
Comput. Aided Des., 2012

Weakly supervised topic grouping of YouTube search results.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
Checkpoint scheduling model for optimality.
Inf. Process. Lett., 2011

2010
Perception-based reversible watermarking for 2D vector maps.
Proceedings of the Visual Communications and Image Processing 2010, 2010

Perception-driven watermarking with evolutionary block mapping.
Proceedings of the Visual Communications and Image Processing 2010, 2010

Cooperative Work Systems for the Security of Digital Computing Infrastructure.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Iterative embedding-based reversible watermarking for 2D-vector maps.
Proceedings of the International Conference on Image Processing, 2010

2008
Topo-Semantic Constraints Checking.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

An Efficient Checkpointing and Rollback Recovery Scheme for Cluster-Based Multi-channel Ad Hoc Wireless Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

2007
An Adaptive Energy-Efficient and Low-Latency MAC Protocol in Wireless Sensor Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

An Efficient Handoff Strategy for Mobile Computing Checkpoint System.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
Internet Accessing for IPv6 MANETs.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

A Two-Phase Time-based Consistent Checkpointing Strategy.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

An Efficient Computing-Checkpoint Based Coordinated Checkpoint Algorithm.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

2004
Using Computing Checkpoints Implement Consistent Low-Cost Non-blocking Coordinated Checkpointing.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004


  Loading...