Qin Liu
According to our database1, Qin Liu
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2018
An Anonymous Offline RFID Grouping-Proof Protocol.
Future Internet, 2018
Introduction to the special section on Big data and IoT in e-healthcare.
Computers & Electrical Engineering, 2018
Krait: an ultrafast tool for genome-wide survey of microsatellites and primer design.
Bioinformatics, 2018
An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.
Ad Hoc Networks, 2018
Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud.
IEEE Access, 2018
2017
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2017
An Obfuscatable Designated Verifier Signature Scheme.
IEEE Trans. Emerging Topics Comput., 2017
Enhanced Location Privacy Preserving Scheme in Location-Based Services.
IEEE Systems Journal, 2017
Gait Speed Measurement for Elderly Patients with Risk of Frailty.
Mobile Information Systems, 2017
Using a Large-scale Neural Model of Cortical Object Processing to Investigate the Neural Substrate for Managing Multiple Items in Short-term Memory.
J. Cognitive Neuroscience, 2017
Effective Query Grouping Strategy in Clouds.
J. Comput. Sci. Technol., 2017
Collaborative trajectory privacy preserving scheme in location-based services.
Inf. Sci., 2017
Dynamic access policy in cloud-based personal health record (PHR) systems.
Inf. Sci., 2017
Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks.
IJDSN, 2017
Robust Ghost-Free High-Dynamic-Range Imaging by Visual Salience Based Bilateral Motion Detection and Stack Extension Based Exposure Fusion.
IEICE Transactions, 2017
Anonymizing popularity in online social networks with full utility.
Future Generation Comp. Syst., 2017
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Generation Comp. Syst., 2017
Preface: Security and privacy in big data clouds.
Future Generation Comp. Syst., 2017
A Multilevel Access Control Scheme for Data Security in Transparent Computing.
Computing in Science and Engineering, 2017
Secure hitch in location based social networks.
Computer Communications, 2017
Achieving reliable and secure services in cloud computing environments.
Computers & Electrical Engineering, 2017
A Novel DAL Scheme With Shared-Locking for Semantic Conflict Prevention in Unconstrained Real-Time Collaborative Programming.
IEEE Access, 2017
A lightweight privacy-preserving scheme for metering data collection in smart grid.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017
A Dual Privacy Preserving Scheme in Continuous Location-Based Services.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
An ECC-Based Off-line Anonymous Grouping-Proof Protocol.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Task Analysis-Based User Event Logging for Mobile Applications.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017
Topic Model-Based Road Network Inference from Massive Trajectories.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017
Graph Edge Partitioning via Neighborhood Heuristic.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017
Verifiable Ranked Search over dynamic encrypted data in cloud computing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
Minimal road-side unit placement for delay-bounded applications in bus Ad-hoc networks.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
An Efficient Algorithm for Complex-Valued Neural Networks Through Training Input Weights.
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Visual salience and stack extension based ghost removal for high-dynamic-range imaging.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017
DABKS: Dynamic attribute-based keyword search in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017
Shared-locking for semantic conflict prevention in real-time collaborative programming.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017
Balancing Conflict Prevention and Concurrent Work in Real-Time Collaborative Programming.
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017
Scalable and Parallel Processing of Influence Maximization for Large-Scale Social Networks.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
2016
VENUS: A System for Streamlined Graph Computation on a Single PC.
IEEE Trans. Knowl. Data Eng., 2016
Effect of Longan polysaccharides on proliferation and phenotype maintenance in rabbit articular chondrocytes in vitro.
Med. Biol. Engineering and Computing, 2016
SAND: A fault-tolerant streaming architecture for network traffic analytics.
Journal of Systems and Software, 2016
Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks.
IEEE Communications Letters, 2016
PowerWalk: Scalable Personalized PageRank via Random Walks with Vertex-Centric Decomposition.
CoRR, 2016
Mubug: a mobile service for rapid bug tracking.
SCIENCE CHINA Information Sciences, 2016
Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation.
IEEE Access, 2016
A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Enhancing Location Privacy through User-Defined Grid in Location-Based Services.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Community-Based Adaptive Buffer Management Strategy in Opportunistic Network.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Cooperative Content Downloading in Hybrid VANETs: 3G/4G or RSUs Downloading.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
A secure hierarchical deduplication system in cloud storage.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Compressive Sensing Based on Energy-Efficient Communication.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Delay-bounded and minimal transmission broadcast in LEO satellite networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Dynamic Verifiable Search Over Encrypted Data in Untrusted Clouds.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2016
Trajbase: searching trajectories in multi-region.
Proceedings of the 2nd ACM SIGSPATIAL Workshop on Smart Cities and Urban Analytics, 2016
Characteristics Analysis and Data Mining of Uncertain Influence Based on Power Law.
Proceedings of the Fuzzy Systems and Data Mining II, 2016
PowerWalk: Scalable Personalized PageRank via Random Walks with Vertex-Centric Decomposition.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Non-parametric identification of linear parameter-varying spatially-interconnected systems using an LS-SVM approach.
Proceedings of the 2016 American Control Conference, 2016
Distributed model predictive control of constrained spatially-invariant interconnected systems in input-output form.
Proceedings of the 2016 American Control Conference, 2016
Joint model and scheduling order reduction via balanced truncation for parameter-varying spatially interconnected systems.
Proceedings of the 2016 American Control Conference, 2016
2015
Routing and transmission scheduling for minimizing broadcast delay in multirate wireless mesh networks using directional antennas.
Wireless Communications and Mobile Computing, 2015
Walking in the Cloud: Parallel SimRank at Scale.
PVLDB, 2015
A grid-growing clustering algorithm for geo-spatial data.
Pattern Recognition Letters, 2015
Maximise success probability for real-time sensor networks using contention-based protocols.
IJSNet, 2015
Delay Bounded Roadside Unit Placement in Vehicular Ad Hoc Networks.
IJDSN, 2015
Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment.
Comput. Syst. Sci. Eng., 2015
An Empirical Study of Developer Quality.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015
Clustering Large Undirected Graphs on External Memory.
Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale Measurement, 2015
Multi-atlas Context Forests for Knee MR Image Segmentation.
Proceedings of the Machine Learning in Medical Imaging - 6th International Workshop, 2015
Efficient and privacy-preserving search in multi-source personal health record clouds.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
VENUS: Vertex-centric streamlined graph computation on a single PC.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Delay-bounded minimal cost placement of roadside units in vehicular ad hoc networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Deviation-Based Location Switching Protocol for Trajectory Privacy Protection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
User-Controlled Security Mechanism in Data-Centric Clouds.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Identifying Influential Actors in Social Network Platforms.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015
Distributed identification of spatially-distributed systems based on finite element modelling.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015
A Unified Computation Engine for Big Data Analytics.
Proceedings of the 2nd IEEE/ACM International Symposium on Big Data Computing, 2015
A Compression-Based Filtering Mechanism in Content-Based Publish/Subscribe System.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
Ghost-free high dynamic range imaging via moving objects detection and extension.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015
Distributed antiwindup compensation for spatially-distributed systems.
Proceedings of the American Control Conference, 2015
2014
A Data Rate and Concurrency Balanced Approach for Broadcast in Wireless Mesh Networks.
IEEE Trans. Wireless Communications, 2014
Towards Differential Query Services in Cost-Efficient Clouds.
IEEE Trans. Parallel Distrib. Syst., 2014
Consistency as a Service: Auditing Cloud Consistency.
IEEE Trans. Network and Service Management, 2014
Laser-Machined Microcavities for Simultaneous Measurement of High-Temperature and High-Pressure.
Sensors, 2014
BCDP: Budget Constrained and Delay-Bounded Placement for Hybrid Roadside Units in Vehicular Ad Hoc Networks.
Sensors, 2014
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment.
Inf. Sci., 2014
An optimization framework for adjoint-based climate simulations: A case study of the Zebiak-Cane model.
IJHPCA, 2014
Joint subcarrier, code, and power allocation for parallel multi-radio access in heterogeneous wireless networks.
SCIENCE CHINA Information Sciences, 2014
Spectrum aggregation based spectrum allocation for cognitive radio networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014
Interference Alignment for VFDM Based Uplink Transmission in Two-Tiered Networks.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014
Delay Performance Optimization of Multiaccess for Uplink in Heterogeneous Networks.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014
Secure and Efficient Video Surveillance in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Secure distributed keyword search in multiple clouds.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
Distributed index mechanism based on Hadoop.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
A Supervised Feature Selection Algorithm through Minimum Spanning Tree Clustering.
Proceedings of the 26th IEEE International Conference on Tools with Artificial Intelligence, 2014
fAHRW+: Fairness-aware and locality-enhanced scheduling for multi-server systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014
High Dynamic Range Image Tone Mapping with Edge Preserved Dithering.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2014
Security from the transparent computing aspect.
Proceedings of the International Conference on Computing, Networking and Communications, 2014
An Optimization VM Deployment for Maximizing Energy Utility in Cloud Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
The parameter optimization of kalman filter based on multi-objective memetic algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
A Mutual Information-Based Hybrid Feature Selection Method for Software Cost Estimation Using Feature Clustering.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Optimizing Non-orthogonal Space Distance Using PSO in Software Cost Estimation.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
A new adaptive Kalman filter by combining evolutionary algorithm and fuzzy inference system.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014
Motion area based exposure fusion algorithm for ghost removal in high dynamic range video generation.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014
Distributed control of spatially-interconnected parameter-invariant and LPV models for actuated beams.
Proceedings of the American Control Conference, 2014
2013
A scalable encryption scheme for multi-privileged group communications.
The Journal of Supercomputing, 2013
An approach to decision making based on intuitionistic fuzzy rough sets over two universes.
JORS, 2013
A secure self-destructing scheme for electronic data.
J. Comput. Syst. Sci., 2013
A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts.
J. Applied Mathematics, 2013
Global Inequality in Energy Consumption from 1980 to 2010.
Entropy, 2013
A hybrid method of CSMA/CA and TDMA for real-time data aggregation in wireless sensor networks.
Computer Communications, 2013
Performance analysis of three multi-radio access control policies in heterogeneous wireless networks.
SCIENCE CHINA Information Sciences, 2013
Multi-indexed Graph Based Knowledge Storage System.
Proceedings of the Web Information Systems Engineering - WISE 2013 Workshops, 2013
Hierarchical Power Control in Cognitive Networks.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013
Outsourcing privacy-preserving social networks to a cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Cognitive information-assisted energy efficiency design in green composition networks.
Proceedings of the 20st International Conference on Telecommunications, 2013
Multi-resource allocation for LTE networks: Joint-optimality and distributed algorithm.
Proceedings of the 20st International Conference on Telecommunications, 2013
Dynamic spectrum sharing and user scheduling for CR-MIMO system based on interference alignment.
Proceedings of the 20st International Conference on Telecommunications, 2013
Privacy Preserving for Location-Based Services Using Location Transformation.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
A Structural Analysis of SLAs and Dependencies Using Conceptual Modelling Approach.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Experimental identification of spatially-interconnected parameter-invariant and LPV models for actuated beams.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013
Distributed control of parameter-varying spatially interconnected systems using parameter-dependent Lyapunov functions.
Proceedings of the American Control Conference, 2013
LPV torque vectoring for an electric vehicle using parameter-dependent Lyapunov functions.
Proceedings of the American Control Conference, 2013
2012
Cooperative private searching in clouds.
J. Parallel Distrib. Comput., 2012
Secure and privacy preserving keyword searching for cloud storage services.
J. Network and Computer Applications, 2012
Dispatching design for storage-centric wireless sensor networks.
J. Comb. Optim., 2012
On Feasibility of Interference Alignment for L-Cell Constant Cellular Interfering Networks.
IEEE Communications Letters, 2012
A Fourier integral algorithm and its GPU/CPU collaborative implementation for one-way wave equation migration.
Computers & Geosciences, 2012
Real-Time Data Aggregation for Contention-Based Sensor Networks in Cyber-Physical Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
A Low Complexity Multiuser Interference Compensation Scheme for OFDMA Uplink.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012
Efficient information retrieval for ranked queries in cost-effective cloud environments.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012
Network coding based geographical opportunistic routing for ad hoc cognitive radio networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Joint power control and scheduling for minimizing broadcast delay in Wireless Mesh Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Dynamic Grouping Strategy in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Torque vectoring for an electric vehicle using an LPV drive controller and a torque and slip limiter.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012
Performance evaluation on data reconciliation algorithm in distributed system.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
2011
Topology control for multi-channel multi-radio wireless mesh networks using directional antennas.
Wireless Networks, 2011
Group Based Interference Alignment.
IEEE Communications Letters, 2011
Spatial False Alarms in Cognitive Radio.
IEEE Communications Letters, 2011
A Survey on Distance Vector Routing Protocols
CoRR, 2011
On the Achievability of Interference Alignment for Three-Cell Multi-User MIMO Cellular Networks
CoRR, 2011
Achieving fine-grained access control for secure data sharing on cloud servers.
Concurrency and Computation: Practice and Experience, 2011
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers.
Computers & Security, 2011
Joint Transmit-Receive Spectrum Sharing in Cognitive MIMO Wireless Networks.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011
Real-Time Data Aggregation with High Success Probability in Contention-Based Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Theory for intuitionistic fuzzy rough sets of two universes.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011
Reliable Re-Encryption in Unreliable Clouds.
Proceedings of the Global Communications Conference, 2011
Minimum Delay Broadcast Scheduling for Wireless Networks with Directional Antennas.
Proceedings of the Global Communications Conference, 2011
An introductory software engineering course for software engineering program.
Proceedings of the 24th IEEE-CS Conference on Software Engineering Education and Training, 2011
Two-degree-of-freedom LPV control for a through-the-road hybrid electric vehicle via torque vectoring.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011
Space Division Multiplexing Aided Opportunistic Spectrum Access for Cognitive Radio Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
Secure Locking for Untrusted Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
Constant Bit-Rate Multi-Stage Rate Control for Rate-Distortion Optimized H.264/AVC Encoders.
IEICE Transactions, 2010
Fully Utilized and Low Design Effort Architecture for H.264/AVC Intra Predictor Generation.
Proceedings of the Advances in Multimedia Modeling, 2010
Low Bit-Rate Motion Block Detection for Uncompressed Indoor Surveillance.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010
A Secure Self-Destructing Scheme for Electronic Data.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
A Scalable Encryption Scheme for Multi-Privileged Group Communications.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Efficient Sharing of Secure Cloud Storage Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Macroblock Feature Based Adaptive Propagate Partial SAD Architecture for HDTV Application.
IPSJ Trans. System LSI Design Methodology, 2009
Hardware-Oriented Early Detection Algorithms for 4×4 and 8×8 All-Zero Blocks in H.264
IEICE Transactions, 2009
Macroblock and Motion Feature Analysis to H.264/AVC Fast Inter Mode Decision.
IEICE Transactions, 2009
Adaptive Sub-Sampling Based Reconfigurable SAD Tree Architecture for HDTV Application.
IEICE Transactions, 2009
VLSI Oriented Fast Motion Estimation Algorithm Based on Pixel Difference, Block Overlapping and Motion Feature Analysis.
IEICE Transactions, 2009
A two-stage hierarchical regression model for meta-analysis of epidemiologic nonlinear dose-response data.
Computational Statistics & Data Analysis, 2009
Improving Test Quality by a Test Type Analysis Based Method.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
On bit allocation and Lagrange Multiplier adjustment for rate-distortion optimized H.264 rate control.
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009
Highly parallel fractional motion estimation engine for Super Hi-Vision 4k×4k@60fps.
Proceedings of the 2009 IEEE International Workshop on Multimedia Signal Processing, 2009
Content aware configurable architecture for H.264/AVC integer motion estimation engine.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Macroblock feature and motion involved multi-stage fast inter mode decision algorithm in H.264/AVC video coding.
Proceedings of the International Conference on Image Processing, 2009
Reconfigurable SAD tree architecture based on adaptive sub-sampling in HDTV application.
Proceedings of the 19th ACM Great Lakes Symposium on VLSI 2009, 2009
Rate-distortion optimized multi-stage rate control algorithm for H.264/AVC video coding.
Proceedings of the 17th European Signal Processing Conference, 2009
Fast inter mode decision algorithm based on macroblock and motion feature analysis for H.264/AVC video coding.
Proceedings of the 17th European Signal Processing Conference, 2009
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Evaluation of preliminary data analysis framework in software cost estimation based on ISBSG R9 Data.
Software Quality Journal, 2008
A 41 mW VGA@30 fps Quadtree Video Encoder for Video Surveillance Systems.
IEICE Transactions, 2008
Edge Block Detection and Motion Vector Information Based Fast VBSME Algorithm.
IEICE Transactions, 2008
Macroblock Feature Based Complexity Reduction for H.264/AVC Motion Estimation.
IEICE Transactions, 2008
Optimal precomputation for mapping service level agreements in grid computing.
Future Generation Comp. Syst., 2008
Early detection algorithms for 8×8 all-zero blocks in H.264/AVC.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
A motion vector difference based self-incremental adaptive search range algorithm for variable block size motion estimation.
Proceedings of the International Conference on Image Processing, 2008
Early detection algorithms for 4×4 and 8×8 all-zero blocks in H.264/AVC.
Proceedings of the 2008 16th European Signal Processing Conference, 2008
Compressor tree based processing element optimization in propagate partial SAD architecture.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008
2007
Energy efficient multicast routing in ad hoc wireless networks.
Computer Communications, 2007
2006
Optimal utilization of historical data sets for the construction of software cost prediction models.
PhD thesis, 2006
Bandwidth Guaranteed Routing in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, 2006
Heuristic algorithms for real-time data aggregation in wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
Optimal precomputation for mapping service level agreements in grid applications.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006
2005
Preliminary Data Analysis Methods in Software Estimation.
Software Quality Journal, 2005
A graph-based proactive fault identification approach in computer networks.
Computer Communications, 2005
A Frame for Selecting Replicated Multicast Servers Using Genetic Algorithm.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
A Practical Radiosity Method for Predicting Transmission Loss in Urban Environments.
EURASIP J. Wireless Comm. and Networking, 2004
2003
Applications of Server Performance Control with Simple Network Management Protocol.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
1995
Matched median filter for detecting QAM signals.
IEEE Trans. Communications, 1995
1994
Technical Note - Optimal Locations on a Line with Random Utilities.
Transportation Science, 1994
1993
Adaptive radar detection and estimation: edited by Simon Haykin, Communication Research Laboratory, McMaster University, Hamilton, Ontario, Canada and Allan Steinhardt, Department of Electrical Engineering, Cornel University, Ithaca, New York, Wiley Series in Remote Sensing. Publishers: John Wiley and Sons, 1992, ISBN 0-471-544468-X.
Signal Processing, 1993
Matched median filters for binary pulse compression.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993