The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Liang Xiao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Liang Xiao, Chenrong Huang, Haijun Liang, Huizhong Wu
    Concealment of Damaged Block Coded Images Using Intelligent Two-Step Best Neighborhood Matching Algorithm. [Citation Graph (0, 0)][DBLP]
    CGIV, 2005, pp:38-42 [Conf]
  2. Liang Xiao, Huizhong Wu, Shuchun Tang, Yang Liu
    Modeling and Simulation of Digital Scene Image Synthesis Using Image Intensified CCD Under Different Weathers in Scene Matching Simulation System. [Citation Graph (0, 0)][DBLP]
    AsiaSim, 2004, pp:607-616 [Conf]
  3. Liang Xiao, Zhihui Wei, Huizhong Wu
    Novel Method for Computer Create Van Gogh's Oil Style Painting. [Citation Graph (0, 0)][DBLP]
    Edutainment, 2007, pp:740-750 [Conf]
  4. Liang Xiao, Zhihui Wei, Huizhong Wu
    Robust Orientation Diffusion Via PCA Method and Application to Image Super-Resolution Reconstruction. [Citation Graph (0, 0)][DBLP]
    LSMS (1), 2007, pp:726-735 [Conf]

  5. Research of Multiple Watermarks Algorithm in E-commerce Copyright Protection and Tracking. [Citation Graph (, )][DBLP]


  6. Collaborative design environment based on multi-agent. [Citation Graph (, )][DBLP]


  7. A Super-resolution Reconstruction via Local and Contextual Information Driven Partial Differential Equations. [Citation Graph (, )][DBLP]


  8. A Sub-pixel Multifractal Method for the Image Segmentation. [Citation Graph (, )][DBLP]


  9. Geological Anomaly Mining in Mineralization Based on Rough Set. [Citation Graph (, )][DBLP]


  10. Research on moving object detection and tracking. [Citation Graph (, )][DBLP]


  11. A Physical-Layer Technique to Enhance Authentication for Mobile Terminals. [Citation Graph (, )][DBLP]


  12. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication. [Citation Graph (, )][DBLP]


  13. Compressed sensing image reconstruction based on morphological component analysis. [Citation Graph (, )][DBLP]


  14. Automatic and Reliable Extraction of Dendrite Backbone from Optical Microscopy Images. [Citation Graph (, )][DBLP]


  15. MIMO-assisted channel-based authentication in wireless networks. [Citation Graph (, )][DBLP]


  16. A Nonlinear Inverse Scale Space Method for Multiplicative Noise Removal Based on Weberized Total Variation. [Citation Graph (, )][DBLP]


  17. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication [Citation Graph (, )][DBLP]


  18. MIMO-Assisted Channel-Based Authentication in Wireless Networks [Citation Graph (, )][DBLP]


  19. Using the Physical Layer for Wireless Authentication in Time-Variant Channels [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002