Qin Liu

According to our database1, Qin Liu
  • authored at least 198 papers between 1993 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2017

An Obfuscatable Designated Verifier Signature Scheme.
IEEE Trans. Emerging Topics Comput., 2017

Enhanced Location Privacy Preserving Scheme in Location-Based Services.
IEEE Systems Journal, 2017

Using a Large-scale Neural Model of Cortical Object Processing to Investigate the Neural Substrate for Managing Multiple Items in Short-term Memory.
J. Cognitive Neuroscience, 2017

Effective Query Grouping Strategy in Clouds.
J. Comput. Sci. Technol., 2017

Collaborative trajectory privacy preserving scheme in location-based services.
Inf. Sci., 2017

Dynamic access policy in cloud-based personal health record (PHR) systems.
Inf. Sci., 2017

Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks.
IJDSN, 2017

Robust Ghost-Free High-Dynamic-Range Imaging by Visual Salience Based Bilateral Motion Detection and Stack Extension Based Exposure Fusion.
IEICE Transactions, 2017

Anonymizing popularity in online social networks with full utility.
Future Generation Comp. Syst., 2017

Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Generation Comp. Syst., 2017

Preface: Security and privacy in big data clouds.
Future Generation Comp. Syst., 2017

A Multilevel Access Control Scheme for Data Security in Transparent Computing.
Computing in Science and Engineering, 2017

Secure hitch in location based social networks.
Computer Communications, 2017

Achieving reliable and secure services in cloud computing environments.
Computers & Electrical Engineering, 2017

A Novel DAL Scheme With Shared-Locking for Semantic Conflict Prevention in Unconstrained Real-Time Collaborative Programming.
IEEE Access, 2017

A lightweight privacy-preserving scheme for metering data collection in smart grid.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

A Dual Privacy Preserving Scheme in Continuous Location-Based Services.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

An ECC-Based Off-line Anonymous Grouping-Proof Protocol.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Task Analysis-Based User Event Logging for Mobile Applications.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017

Topic Model-Based Road Network Inference from Massive Trajectories.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017

Graph Edge Partitioning via Neighborhood Heuristic.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Verifiable Ranked Search over dynamic encrypted data in cloud computing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

An Efficient Algorithm for Complex-Valued Neural Networks Through Training Input Weights.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

DABKS: Dynamic attribute-based keyword search in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

Balancing Conflict Prevention and Concurrent Work in Real-Time Collaborative Programming.
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017

Scalable and Parallel Processing of Influence Maximization for Large-Scale Social Networks.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
VENUS: A System for Streamlined Graph Computation on a Single PC.
IEEE Trans. Knowl. Data Eng., 2016

Effect of Longan polysaccharides on proliferation and phenotype maintenance in rabbit articular chondrocytes in vitro.
Med. Biol. Engineering and Computing, 2016

SAND: A fault-tolerant streaming architecture for network traffic analytics.
Journal of Systems and Software, 2016

Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks.
IEEE Communications Letters, 2016

PowerWalk: Scalable Personalized PageRank via Random Walks with Vertex-Centric Decomposition.
CoRR, 2016

Mubug: a mobile service for rapid bug tracking.
SCIENCE CHINA Information Sciences, 2016

Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation.
IEEE Access, 2016

A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enhancing Location Privacy through User-Defined Grid in Location-Based Services.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Cooperative Content Downloading in Hybrid VANETs: 3G/4G or RSUs Downloading.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

A secure hierarchical deduplication system in cloud storage.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Compressive Sensing Based on Energy-Efficient Communication.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Delay-bounded and minimal transmission broadcast in LEO satellite networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Dynamic Verifiable Search Over Encrypted Data in Untrusted Clouds.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2016

Trajbase: searching trajectories in multi-region.
Proceedings of the 2nd ACM SIGSPATIAL Workshop on Smart Cities and Urban Analytics, 2016

Characteristics Analysis and Data Mining of Uncertain Influence Based on Power Law.
Proceedings of the Fuzzy Systems and Data Mining II, 2016

PowerWalk: Scalable Personalized PageRank via Random Walks with Vertex-Centric Decomposition.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Non-parametric identification of linear parameter-varying spatially-interconnected systems using an LS-SVM approach.
Proceedings of the 2016 American Control Conference, 2016

Distributed model predictive control of constrained spatially-invariant interconnected systems in input-output form.
Proceedings of the 2016 American Control Conference, 2016

Joint model and scheduling order reduction via balanced truncation for parameter-varying spatially interconnected systems.
Proceedings of the 2016 American Control Conference, 2016

2015
Routing and transmission scheduling for minimizing broadcast delay in multirate wireless mesh networks using directional antennas.
Wireless Communications and Mobile Computing, 2015

Walking in the Cloud: Parallel SimRank at Scale.
PVLDB, 2015

A grid-growing clustering algorithm for geo-spatial data.
Pattern Recognition Letters, 2015

Maximise success probability for real-time sensor networks using contention-based protocols.
IJSNet, 2015

Delay Bounded Roadside Unit Placement in Vehicular Ad Hoc Networks.
IJDSN, 2015

Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment.
Comput. Syst. Sci. Eng., 2015

An Empirical Study of Developer Quality.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Clustering Large Undirected Graphs on External Memory.
Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale Measurement, 2015

Multi-atlas Context Forests for Knee MR Image Segmentation.
Proceedings of the Machine Learning in Medical Imaging - 6th International Workshop, 2015

Efficient and privacy-preserving search in multi-source personal health record clouds.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

VENUS: Vertex-centric streamlined graph computation on a single PC.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Delay-bounded minimal cost placement of roadside units in vehicular ad hoc networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Deviation-Based Location Switching Protocol for Trajectory Privacy Protection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

User-Controlled Security Mechanism in Data-Centric Clouds.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Identifying Influential Actors in Social Network Platforms.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Distributed identification of spatially-distributed systems based on finite element modelling.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

A Unified Computation Engine for Big Data Analytics.
Proceedings of the 2nd IEEE/ACM International Symposium on Big Data Computing, 2015

A Compression-Based Filtering Mechanism in Content-Based Publish/Subscribe System.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Ghost-free high dynamic range imaging via moving objects detection and extension.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

Distributed antiwindup compensation for spatially-distributed systems.
Proceedings of the American Control Conference, 2015

2014
A Data Rate and Concurrency Balanced Approach for Broadcast in Wireless Mesh Networks.
IEEE Trans. Wireless Communications, 2014

Towards Differential Query Services in Cost-Efficient Clouds.
IEEE Trans. Parallel Distrib. Syst., 2014

Consistency as a Service: Auditing Cloud Consistency.
IEEE Trans. Network and Service Management, 2014

Laser-Machined Microcavities for Simultaneous Measurement of High-Temperature and High-Pressure.
Sensors, 2014

BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks.
Sensors, 2014

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment.
Inf. Sci., 2014

An optimization framework for adjoint-based climate simulations: A case study of the Zebiak-Cane model.
IJHPCA, 2014

Joint subcarrier, code, and power allocation for parallel multi-radio access in heterogeneous wireless networks.
SCIENCE CHINA Information Sciences, 2014

Spectrum aggregation based spectrum allocation for cognitive radio networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Interference Alignment for VFDM Based Uplink Transmission in Two-Tiered Networks.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Delay Performance Optimization of Multiaccess for Uplink in Heterogeneous Networks.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

Secure and Efficient Video Surveillance in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Secure distributed keyword search in multiple clouds.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Distributed index mechanism based on Hadoop.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

A Supervised Feature Selection Algorithm through Minimum Spanning Tree Clustering.
Proceedings of the 26th IEEE International Conference on Tools with Artificial Intelligence, 2014

fAHRW+: Fairness-aware and locality-enhanced scheduling for multi-server systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

High Dynamic Range Image Tone Mapping with Edge Preserved Dithering.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2014

Security from the transparent computing aspect.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

An Optimization VM Deployment for Maximizing Energy Utility in Cloud Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

The parameter optimization of kalman filter based on multi-objective memetic algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

A Mutual Information-Based Hybrid Feature Selection Method for Software Cost Estimation Using Feature Clustering.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Optimizing Non-orthogonal Space Distance Using PSO in Software Cost Estimation.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

A new adaptive Kalman filter by combining evolutionary algorithm and fuzzy inference system.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

Motion area based exposure fusion algorithm for ghost removal in high dynamic range video generation.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

Distributed control of spatially-interconnected parameter-invariant and LPV models for actuated beams.
Proceedings of the American Control Conference, 2014

2013
A scalable encryption scheme for multi-privileged group communications.
The Journal of Supercomputing, 2013

An approach to decision making based on intuitionistic fuzzy rough sets over two universes.
JORS, 2013

A secure self-destructing scheme for electronic data.
J. Comput. Syst. Sci., 2013

A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts.
J. Applied Mathematics, 2013

Global Inequality in Energy Consumption from 1980 to 2010.
Entropy, 2013

A hybrid method of CSMA/CA and TDMA for real-time data aggregation in wireless sensor networks.
Computer Communications, 2013

Performance analysis of three multi-radio access control policies in heterogeneous wireless networks.
SCIENCE CHINA Information Sciences, 2013

Multi-indexed Graph Based Knowledge Storage System.
Proceedings of the Web Information Systems Engineering - WISE 2013 Workshops, 2013

Hierarchical Power Control in Cognitive Networks.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Outsourcing privacy-preserving social networks to a cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Cognitive information-assisted energy efficiency design in green composition networks.
Proceedings of the 20st International Conference on Telecommunications, 2013

Multi-resource allocation for LTE networks: Joint-optimality and distributed algorithm.
Proceedings of the 20st International Conference on Telecommunications, 2013

Dynamic spectrum sharing and user scheduling for CR-MIMO system based on interference alignment.
Proceedings of the 20st International Conference on Telecommunications, 2013

Privacy Preserving for Location-Based Services Using Location Transformation.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

A Structural Analysis of SLAs and Dependencies Using Conceptual Modelling Approach.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Experimental identification of spatially-interconnected parameter-invariant and LPV models for actuated beams.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Distributed control of parameter-varying spatially interconnected systems using parameter-dependent Lyapunov functions.
Proceedings of the American Control Conference, 2013

LPV torque vectoring for an electric vehicle using parameter-dependent Lyapunov functions.
Proceedings of the American Control Conference, 2013

2012
Cooperative private searching in clouds.
J. Parallel Distrib. Comput., 2012

Secure and privacy preserving keyword searching for cloud storage services.
J. Network and Computer Applications, 2012

Dispatching design for storage-centric wireless sensor networks.
J. Comb. Optim., 2012

On Feasibility of Interference Alignment for L-Cell Constant Cellular Interfering Networks.
IEEE Communications Letters, 2012

A Fourier integral algorithm and its GPU/CPU collaborative implementation for one-way wave equation migration.
Computers & Geosciences, 2012

Real-Time Data Aggregation for Contention-Based Sensor Networks in Cyber-Physical Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

A Low Complexity Multiuser Interference Compensation Scheme for OFDMA Uplink.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Efficient information retrieval for ranked queries in cost-effective cloud environments.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

Network coding based geographical opportunistic routing for ad hoc cognitive radio networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Joint power control and scheduling for minimizing broadcast delay in Wireless Mesh Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Dynamic Grouping Strategy in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Torque vectoring for an electric vehicle using an LPV drive controller and a torque and slip limiter.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Performance evaluation on data reconciliation algorithm in distributed system.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Topology control for multi-channel multi-radio wireless mesh networks using directional antennas.
Wireless Networks, 2011

Group Based Interference Alignment.
IEEE Communications Letters, 2011

Spatial False Alarms in Cognitive Radio.
IEEE Communications Letters, 2011

A Survey on Distance Vector Routing Protocols
CoRR, 2011

On the Achievability of Interference Alignment for Three-Cell Multi-User MIMO Cellular Networks
CoRR, 2011

Achieving fine-grained access control for secure data sharing on cloud servers.
Concurrency and Computation: Practice and Experience, 2011

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers.
Computers & Security, 2011

Joint Transmit-Receive Spectrum Sharing in Cognitive MIMO Wireless Networks.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Real-Time Data Aggregation with High Success Probability in Contention-Based Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Theory for intuitionistic fuzzy rough sets of two universes.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

Reliable Re-Encryption in Unreliable Clouds.
Proceedings of the Global Communications Conference, 2011

Minimum Delay Broadcast Scheduling for Wireless Networks with Directional Antennas.
Proceedings of the Global Communications Conference, 2011

An introductory software engineering course for software engineering program.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011

Two-degree-of-freedom LPV control for a through-the-road hybrid electric vehicle via torque vectoring.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

Space Division Multiplexing Aided Opportunistic Spectrum Access for Cognitive Radio Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

Secure Locking for Untrusted Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Constant Bit-Rate Multi-Stage Rate Control for Rate-Distortion Optimized H.264/AVC Encoders.
IEICE Transactions, 2010

Fully Utilized and Low Design Effort Architecture for H.264/AVC Intra Predictor Generation.
Proceedings of the Advances in Multimedia Modeling, 2010

Low Bit-Rate Motion Block Detection for Uncompressed Indoor Surveillance.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

A Secure Self-Destructing Scheme for Electronic Data.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A Scalable Encryption Scheme for Multi-Privileged Group Communications.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Hierarchical attribute-based encryption for fine-grained access control in cloud storage services.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Efficient Sharing of Secure Cloud Storage Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Macroblock Feature Based Adaptive Propagate Partial SAD Architecture for HDTV Application.
IPSJ Trans. System LSI Design Methodology, 2009

Hardware-Oriented Early Detection Algorithms for 4×4 and 8×8 All-Zero Blocks in H.264
IEICE Transactions, 2009

Macroblock and Motion Feature Analysis to H.264/AVC Fast Inter Mode Decision.
IEICE Transactions, 2009

Adaptive Sub-Sampling Based Reconfigurable SAD Tree Architecture for HDTV Application.
IEICE Transactions, 2009

VLSI Oriented Fast Motion Estimation Algorithm Based on Pixel Difference, Block Overlapping and Motion Feature Analysis.
IEICE Transactions, 2009

A two-stage hierarchical regression model for meta-analysis of epidemiologic nonlinear dose-response data.
Computational Statistics & Data Analysis, 2009

Improving Test Quality by a Test Type Analysis Based Method.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

On bit allocation and Lagrange Multiplier adjustment for rate-distortion optimized H.264 rate control.
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009

Highly parallel fractional motion estimation engine for Super Hi-Vision 4k×4k@60fps.
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009

Content aware configurable architecture for H.264/AVC integer motion estimation engine.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Macroblock feature and motion involved multi-stage fast inter mode decision algorithm in H.264/AVC video coding.
Proceedings of the International Conference on Image Processing, 2009

Reconfigurable SAD tree architecture based on adaptive sub-sampling in HDTV application.
Proceedings of the 19th ACM Great Lakes Symposium on VLSI 2009, 2009

Rate-distortion optimized multi-stage rate control algorithm for H.264/AVC video coding.
Proceedings of the 17th European Signal Processing Conference, 2009

Fast inter mode decision algorithm based on macroblock and motion feature analysis for H.264/AVC video coding.
Proceedings of the 17th European Signal Processing Conference, 2009

An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Evaluation of preliminary data analysis framework in software cost estimation based on ISBSG R9 Data.
Software Quality Journal, 2008

A 41 mW VGA@30 fps Quadtree Video Encoder for Video Surveillance Systems.
IEICE Transactions, 2008

Edge Block Detection and Motion Vector Information Based Fast VBSME Algorithm.
IEICE Transactions, 2008

Macroblock Feature Based Complexity Reduction for H.264/AVC Motion Estimation.
IEICE Transactions, 2008

Optimal precomputation for mapping service level agreements in grid computing.
Future Generation Comp. Syst., 2008

Early detection algorithms for 8×8 all-zero blocks in H.264/AVC.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

A motion vector difference based self-incremental adaptive search range algorithm for variable block size motion estimation.
Proceedings of the International Conference on Image Processing, 2008

Early detection algorithms for 4×4 and 8×8 all-zero blocks in H.264/AVC.
Proceedings of the 2008 16th European Signal Processing Conference, 2008

Compressor tree based processing element optimization in propagate partial SAD architecture.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008

2007
Energy efficient multicast routing in ad hoc wireless networks.
Computer Communications, 2007

2006
Optimal utilization of historical data sets for the construction of software cost prediction models.
PhD thesis, 2006

Bandwidth Guaranteed Routing in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, 2006

Heuristic algorithms for real-time data aggregation in wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Optimal precomputation for mapping service level agreements in grid applications.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

2005
Preliminary Data Analysis Methods in Software Estimation.
Software Quality Journal, 2005

A graph-based proactive fault identification approach in computer networks.
Computer Communications, 2005

A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Practical Radiosity Method for Predicting Transmission Loss in Urban Environments.
EURASIP J. Wireless Comm. and Networking, 2004

2003
Applications of Server Performance Control with Simple Network Management Protocol.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

1995
Matched median filter for detecting QAM signals.
IEEE Trans. Communications, 1995

1994
Technical Note - Optimal Locations on a Line with Random Utilities.
Transportation Science, 1994

1993
Adaptive radar detection and estimation: edited by Simon Haykin, Communication Research Laboratory, McMaster University, Hamilton, Ontario, Canada and Allan Steinhardt, Department of Electrical Engineering, Cornel University, Ithaca, New York, Wiley Series in Remote Sensing. Publishers: John Wiley and Sons, 1992, ISBN 0-471-544468-X.
Signal Processing, 1993

Matched median filters for binary pulse compression.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993


  Loading...