The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kwok-Tung Lo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jian Feng, Kwok-Tung Lo, Hassan Mehrpour
    Simulation Analysis on Statistical Multiplexing of MPEG Video Sources. [Citation Graph (0, 0)][DBLP]
    ICC (1), 1997, pp:540-544 [Conf]
  2. Wing-Fai Poon, Kwok-Tung Lo, Jian Feng
    Hierarchical Network Architecture for Layered Video Streaming. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2004, pp:164-169 [Conf]
  3. Yuk-Hee Chan, H. T. Kwong, C. K. Li, Kwok-Tung Lo
    A Multiscale Error Diffusion Technique for Digital Halftoning with Dot-Overlap Compensation. [Citation Graph (0, 0)][DBLP]
    ICIP (4), 1999, pp:323-327 [Conf]
  4. H. T. Tang, Kwok-Tung Lo, Jian Feng
    New Fast Search Algorithm for Block Matching Motion Estimation. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1999, pp:681-685 [Conf]
  5. Jian Feng, Hassan Mehrpour, Kwok-Tung Lo, A. E. Karbowiak
    Two-Layer MPEG Video Coding Algorithm for ATM Networks. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1995, pp:605-608 [Conf]
  6. Kwok-Tung Lo, Wai-Kuen Cham
    New orthogonal transform for image compression. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:263-266 [Conf]
  7. Kwok-Tung Lo, Jian Feng
    New Dyadic Transform for Image Compression. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1995, pp:777-780 [Conf]
  8. Jian Feng, Tie-Yan Liu, Kwok-Tung Lo, Xu-Dong Zhang
    Adaptive motion tracking for fast block motion estimation. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2001, pp:219-222 [Conf]
  9. Hui Guo, Kwok-Tung Lo, Chi-Tsun Cheng
    Overlay Networks Construction for Multilayered Live Media Streaming. [Citation Graph (0, 0)][DBLP]
    ISM, 2006, pp:427-436 [Conf]
  10. Wing-Fai Poon, Kwok-Tung Lo, Jian Feng
    Performance Study for Streaming Layered Encoded Videos in Broadcast Environment. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:722-727 [Conf]
  11. Wai-Chung Poon, Kwok-Tung Lo
    The transportation of VBR-encoded video using deterministic characterization and bandwidth renegotiation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:8, pp:731-740 [Journal]
  12. Wai-Chung Poon, Kwok-Tung Lo
    The study on statistical multiplexing of homogeneous VBR-MPEG video streams. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:15-16, pp:1457-1467 [Journal]
  13. Wing-Fai Poon, Kwok-Tung Lo, Jian Feng
    First segment partition for video-on-demand broadcasting protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:14, pp:1698-1708 [Journal]
  14. Wing-Fai Poon, Kwok-Tung Lo, Jian Feng
    Performance study on implementation of VCR functionality in staggered broadcast video-on-demand systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:95-107 [Journal]
  15. Tie-Yan Liu, Xu-Dong Zhang, Jian Feng, Kwok-Tung Lo
    Shot reconstruction degree: a novel criterion for key frame selection. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2004, v:25, n:12, pp:1451-1457 [Journal]
  16. Xu-Dong Zhang, Tie-Yan Liu, Kwok-Tung Lo, Jian Feng
    Dynamic selection and effective compression of key frames for video abstraction. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2003, v:24, n:9-10, pp:1523-1532 [Journal]
  17. Wing-Fai Poon, Kwok-Tung Lo, Jian Feng
    Determination of efficient transmission scheme for video-on-demand (VoD) services. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:2, pp:188-192 [Journal]
  18. Wing-Fai Poon, Kwok-Tung Lo, Jian Feng
    A hierarchical video-on-demand system with double-rate batching. [Citation Graph (0, 0)][DBLP]
    J. Visual Communication and Image Representation, 2005, v:16, n:1, pp:1-18 [Journal]
  19. Tie-Yan Liu, Kwok-Tung Lo, Xu-Dong Zhang, Jian Feng
    A new cut detection algorithm with constant false-alarm ratio for video segmentation. [Citation Graph (0, 0)][DBLP]
    J. Visual Communication and Image Representation, 2004, v:15, n:2, pp:132-144 [Journal]
  20. Hui Guo, Kwok-Tung Lo, Jiang Li
    LSONet: A Case of Layer-Encoded Video Transmission in Overlay Networks. [Citation Graph (0, 0)][DBLP]
    MMM (1), 2007, pp:485-494 [Conf]
  21. Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava, Kwok-Tung Lo
    On the Design of Perceptual MPEG-Video Encryption Algorithms [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  22. Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen
    Cryptanalysis of an Encryption Scheme Based on Blind Source Separation [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  23. Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen, Kwok-Tung Lo
    Cryptanalysis of a chaotic block cipher with external key and its improved version [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  24. Shujun Li, Kwok-Tung Lo
    Security problems with improper implementations of improved FEA-M. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:5, pp:791-794 [Journal]
  25. Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava, Kwok-Tung Lo
    On the Design of Perceptual MPEG-Video Encryption Algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2007, v:17, n:2, pp:214-223 [Journal]
  26. Xu-Dong Zhang, Jian Feng, Kwok-Tung Lo
    Image watermarking using tree-based spatial-frequency feature of wavelet transform. [Citation Graph (0, 0)][DBLP]
    J. Visual Communication and Image Representation, 2003, v:14, n:4, pp:474-491 [Journal]

  27. Design of a Peer-to-Peer Video-on-Demand System with the Consideration of Fault Exception. [Citation Graph (, )][DBLP]


  28. Cryptanalysis of an Image Encryption Scheme Using Cellular Automata Substitution and SCAN. [Citation Graph (, )][DBLP]


  29. On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. [Citation Graph (, )][DBLP]


  30. Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [Citation Graph (, )][DBLP]


  31. Security Problems with Improper Implementations of Improved FEA-M [Citation Graph (, )][DBLP]


  32. Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps [Citation Graph (, )][DBLP]


  33. Breaking a Chaotic Cryptographic Scheme Based on Composition Maps [Citation Graph (, )][DBLP]


  34. A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS) [Citation Graph (, )][DBLP]


  35. Security analysis of a binary image permutation scheme based on Logistic map [Citation Graph (, )][DBLP]


  36. Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps [Citation Graph (, )][DBLP]


  37. Breaking an image encryption algorithm based on chaos [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002