Personensuche
X
?
Lecture Notes in Civil Engineering; ICACE 2019 ,
1
New Regional-Specific Urban Runoff Prediction Model of Sung..:
, In:
?
Proceedings of the 5th ACM International Conference on Multimedia in Asia Workshops ,
2
MAAIG : Motion Analysis And Instruction Generation:
, In:
?
Recent Advances in Cancer Research and Therapy ,
3
Possibility to Partly Win the War Against Cancer:
, In:
?
2024 IEEE Symposium on VLSI Technology and Circuits (VLSI Technology and Circuits) ,
5
Bit-Cost-Scalable 3D DRAM Architecture and Unit Cell First ..:
, In:
?
2023 IEEE 6th International Conference on Knowledge Innovation and Invention (ICKII) ,
6
Development of Machine Learning Based Real-Time Squat Train..:
, In:
?
2023 Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) ,
7
The color demosaicing and image scaling based on improve Ha..:
, In:
?
2022 Antenna Measurement Techniques Association Symposium (AMTA) ,
8
Using a VNA Based Spherical Near Field Antenna Measurement ..:
, In:
?
2020 IEEE Winter Applications of Computer Vision Workshops (WACVW) ,
9
Disrupting Image-Translation-Based DeepFake Algorithms with..:
, In:
?
2019 Conference on Lasers and Electro-Optics (CLEO) ,
10
Silicon Solar Cells Efficiency Enhanced in NIR Band by Coat..:
, In:
?
2019 IEEE/CVF International Conference on Computer Vision (ICCV) ,
11
SME-Net: Sparse Motion Estimation for Parametric Video Pred..:
, In:
?
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems ,
12
KeDiary : Using Mobile Phones to Assist Patients in Reco..:
, In:
?
Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers ,
13
Using mobile phones to assist patients in recovering from k..:
, In:
?
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia ,
14
MagMobile : enhancing social interactions with rapid vie..:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
15