Kai Qian

Orcid: 0000-0002-9522-9216

According to our database1, Kai Qian authored at least 174 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cumulative absolute velocity prediction for earthquake early warning with deep learning.
Comput. Aided Civ. Infrastructure Eng., June, 2024

Neural radiance fields-based multi-view endoscopic scene reconstruction for surgical simulation.
Int. J. Comput. Assist. Radiol. Surg., May, 2024

Characterizing Internet Card User Portraits for Efficient Churn Prediction Model Design.
IEEE Trans. Mob. Comput., February, 2024

Personalized assessment and training of neurosurgical skills in virtual reality: An interpretable machine learning approach.
Virtual Real. Intell. Hardw., 2024

Optimization Algorithm for Green Environment Design Based on Artificial Intelligence.
Scalable Comput. Pract. Exp., 2024

EAswin-unet: Segmenting CT images of COVID-19 with edge-fusion attention.
Biomed. Signal Process. Control., 2024

AutoHammer: Breaking the Compilation Wall Between Deep Neural Network and Overlay-based FPGA Accelerator.
Proceedings of the 2024 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2024

2023
HPCchain: A Consortium Blockchain System Based on CPU-FPGA Hybrid-PUF for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023

Fine-Grained Benchmarking and Targeted Optimization: Enabling Green IoT-Oriented Blockchain in the 6G Era.
IEEE Trans. Green Commun. Netw., June, 2023

Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access.
Digit. Commun. Networks, April, 2023

gutMDisorder v2.0: a comprehensive database for dysbiosis of gut microbiota in phenotypes and interventions.
Nucleic Acids Res., January, 2023

SHA-SCP: A UI Element Spatial Hierarchy Aware Smartphone User Click Behavior Prediction Method.
CoRR, 2023

Collaborative and Active Learning with Portable Online Hands-on Labware for Blockchain Development.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

Authentic Learning on Machine Learning for Cybersecurity.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

Efficient Implementation of Activation Function on FPGA for Accelerating Neural Networks.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2023

Ranking Cellular Internet Card User VIP Values Based on Graph Clustering with Usage Data.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

microGEMM: An Effective CNN-Based Inference Acceleration for Edge Computing.
Proceedings of the IEEE International Conference on Communications, 2023

AI-Assisted Security: A Step towards Reimagining Software Development for a Safer Future.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Secure Software Development in Google Colab.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

Quantum Machine Learning for Security Data Analysis.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

2022
Effective Scaling of Blockchain Beyond Consensus Innovations and Moore's Law: Challenges and Opportunities.
IEEE Syst. J., 2022

PRAPNet: A Parallel Residual Atrous Pyramid Network for Polyp Segmentation.
Sensors, 2022

EIEN: Endoscopic Image Enhancement Network Based on Retinex Theory.
Sensors, 2022

BCmaster: A Compatible Framework for Comprehensively Analyzing and Monitoring Blockchain Systems in IoT.
IEEE Internet Things J., 2022

Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Enlarging the Long-time Dependencies via RL-based Memory Network in Movie Affective Analysis.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Binaural Sound Source Localization based on Neural Networks in Mismatched HRTF Condition.
Proceedings of the ICCAI '22: 8th International Conference on Computing and Artificial Intelligence, Tianjin, China, March 18, 2022

BCadvisor: Enabling Green Blockchain Systems Through Resource-Oriented Benchmarking.
Proceedings of the IEEE International Conference on Communications, 2022

Scalable Machine Learning Using PySpark.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Broaden Multidisciplinary Data Science Research by an Innovative Cyberinfrastructure Platform.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Improving the Prediction Accuracy with Feature Selection for Ransomware Detection.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Authentic Learning of Machine Learning to Ransomware Detection and Prevention.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Ransomware Classification and Detection With Machine Learning Algorithms.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Intelligent Intraoperative Haptic-AR Navigation for COVID-19 Lung Biopsy Using Deep Hybrid Model.
IEEE Trans. Ind. Informatics, 2021

An Adaptive Neural Architecture Search Design for Collaborative Edge-Cloud Computing.
IEEE Netw., 2021

DLGEA: a deep learning guided evolutionary algorithm for water contamination source identification.
Neural Comput. Appl., 2021

Automatic Recognition and Classification System of Thyroid Nodules in CT Images Based on CNN.
Comput. Intell. Neurosci., 2021

Broadband and Tunable 920-nm Femtosecond Pulse Generated by an All-Fiber Er: Fiber Laser System.
IEEE Access, 2021

Colab Cloud Based Portable and Shareable Hands-on Labware for Machine Learning to Cybersecurity.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

A Target Speaker Separation Neural Network with Joint-Training.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
Spacechain: A Three-Dimensional Blockchain Architecture for IoT Security.
IEEE Wirel. Commun., 2020

Tornado: Enabling Blockchain in Heterogeneous Internet of Things Through a Space-Structured Approach.
IEEE Internet Things J., 2020

Binaural sound localization based on deep neural network and affinity propagation clustering in mismatched HRTF condition.
EURASIP J. Audio Speech Music. Process., 2020

Effective scaling of blockchain beyond consensus innovations and Moore's law.
CoRR, 2020

Performance Benchmarking and Optimization for IIoT-oriented Blockchain.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Information Assurance and Security Education on Undergraduate Computing Degree Programs.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Deep Learning Based Anomaly Detection in Water Distribution Systems.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2020

Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Learning Environment Containerization of Machine Leaning for Cybersecurity.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

An Improved Linear Threshold Model.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

2019
Measurement and analysis of content diffusion characteristics in opportunity environmentswith Spark.
Frontiers Inf. Technol. Electron. Eng., 2019

Data Protection with SMSD Labware.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Application and Research of Image-Based Modeling and 3D Printing Technology in Intangible Cultural Heritage Quanzhou Marionette Protection.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Mobile Software Security with Dynamic Analysis.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Detectors for Intent ICC Security Vulnerability with Android IDE.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Security Threat Analysis of SDN Switch Flow Table.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Authentic Learning Secure Software Development (SSD) in Computing Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Broadening Secure Mobile Software Development (SMSD) Through Curriculum Development (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

OSSpal: Finding and Evaluating Open Source Software.
Proceedings of the Open Source Systems: Towards Robust Practices, 2017

Labware for Secure Mobile Software Development (SMSD) Education.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

Designing an Undergraduate Minor Program in E-Discovery.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017

FlowVisor vulnerability analysis.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Hands-On Learning for Computer Network Security with Mobile Devices.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Learning database security with hands-on mobile labs.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

Using monkey hand exoskeleton to explore finger passive joint movement response in primary motor cortex.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

Improving the Prediction Accuracy of Decision Tree Mining with Data Preprocessing.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Towards Analyzing MongoDB NoSQL Security and Designing Injection Defense Solution.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

2016
A Photonic Crystal Magnetic Field Sensor Using a Shoulder-Coupled Resonant Cavity Infiltrated with Magnetic Fluid.
Sensors, 2016

Design and evaluation of an actuated exoskeleton for examining motor control in stroke thumb.
Adv. Robotics, 2016

A hybrid analysis for mobile security threat detection.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016

Static Mining and Dynamic Taint for Mobile Security Threats Analysis.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

An Open and Portable Platform for Learning Data Security in Mobile Cloud Computing.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Developing Hands-on Labware for Emerging Database Security.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Promote Self-efficacy in Learning of Mobile App and Security with real-world Relevant Laboratory (Abstract Only).
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Multi-dimensional and customizable open-source labware for promoting big data analytical skills in STEM education.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

OpenFlow flow table overflow attacks and countermeasures.
Proceedings of the European Conference on Networks and Communications, 2016

MongoDB NoSQL Injection Analysis and Detection.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Teaching Secure Cloud Computing Concepts with Open Source CloudSim Environment.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Hardware Attacks and Security Education.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Using Real-Time Fear Appeals to Improve Social Media Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Hands-On Labs for Learning Mobile and NoSQL Database Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

The Impact of Data Preprocessing on the Performance of a Naive Bayes Classifier.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Improve the Prediction Accuracy of Naïve Bayes Classifier with Association Rule Mining.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
A hybrid approach for mobile security threat analysis.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Work in progress: Using mobile technology to enhance self-efficacy in underrepresented students for engineering education.
Proceedings of the IEEE International Conference on Teaching, 2015

A Low Cost, Portable Platform for Information Assurance and Security Education.
Proceedings of the 15th IEEE International Conference on Advanced Learning Technologies, 2015

A Neural-Network Based DDoS Detection System Using Hadoop and HBase.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Automated Detection and Analysis for Android Ransomware.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Innovative mobile tool for engineering embedded design and security educations.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Mobile security education on portable labs.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Learning Hands-on Information Assurance and Security on Mobile Devices.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Web Service-Enabled Spam Filtering with Naïve Bayes Classification.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

2014
Learning Mobile Security with Labware.
IEEE Secur. Priv., 2014

Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs.
Proceedings of the Innovation and Technology in Computer Science Education Conference 2014, 2014

Learning cloud computing and security through CloudSim simulation.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

Authentic learning in network and security with portable labs.
Proceedings of the IEEE Frontiers in Education Conference, 2014

A multidisciplinary project for undergraduate summer research in computer systems.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

Labware for networking protocols and wireless security using Android-enabled mobile devices.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Learning mobile security with android security labware.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Mobile device based authentic learning for computer network and security.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

A fostering embedded system educationwith android sensory embedded system labware.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

Contradistinction and Relevant Learning for Transform Processing with Smartphones in Engineering Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

Android-Based Mobile Sensory System Labware for Embedded System Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

Low-cost and portable labware for computing curriculum using scalable mobile sensory platform.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Authentic learning of mobile security with case studies.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Operant conditioning of a multiple degree-of-freedom brain-machine interface in a primate model of amputation.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

2012
The cross-curriculum mobile computing labware for CS (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Real-World Relevant Learning with Android Smartphones.
Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, 2012

Work in progress: Enhance CS/CE student learning in computer architecture and organization through a remote instrument control lab with mixed reality.
Proceedings of the IEEE Frontiers in Education Conference, 2012

Work in progress: Multi-faceted penetration of fast fourier transform by interactively analyzing real-world objects via mobile technology.
Proceedings of the IEEE Frontiers in Education Conference, 2012

Work in progress: Real world relevant security labware for mobile threat analysis and protection experience.
Proceedings of the IEEE Frontiers in Education Conference, 2012

2011
ThinStore: Out-of-Band Virtualization with Thin Provisioning.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Live Programming Learning Objects on Cloud.
Proceedings of the ICALT 2011, 2011

A Simple Low-Cost Portable Energy Efficient Device to Supplement Operating System Curriculum.
Proceedings of the ICALT 2011, 2011

A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education.
Proceedings of the ICALT 2011, 2011

A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning.
Proceedings of the ICALT 2011, 2011

Work in progress - Live programming learning objects repository.
Proceedings of the 2011 Frontiers in Education Conference, 2011

Event-related desynchronization/ synchronization-based brain-computer interface towards volitional cursor control in a 2D center-out paradigm.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence, 2011

Teaching operating systems with simple low-cost portable energy efficient devices.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
A new method of information decision-making based on D-S evidence theory.
Proceedings of the IEEE International Conference on Systems, 2010

BAUT: A Bayesian Driven Tutoring System.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Design of Online Runtime and Testing Environment for Instant Java Programming Assessment.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Inquiry-based active learning in introductory programming courses.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Portable labs in a box for embedded system education.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Innovative CS capstone projects on green energy applications with WSN in a box.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Green Computing Methodology for Next Generation Computing Scientists.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Leveraging CS capstone project and green smart energy computing with WSN in a box.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

A novel embedded system curriculum with portable hands-on labs in a box.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

Using the online webwork for student's homework practice in education.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

2009
A discussion on security typing and measurement for SOA.
ACM SIGSOFT Softw. Eng. Notes, 2009

Teach real-time embedded system online with real hands-on labs.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009

2008
Under Development - UCD in Chinese IT enterprises.
Interactions, 2008

APOGEE: automated project grading and instant feedback system for web based computing.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

Dynamical Proxy for Dynamic Services.
Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008

SAFELI: SQL injection scanner using symbolic execution.
Proceedings of the 2008 Workshop on Testing, 2008

The automated web application testing (AWAT) system.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

Race condition in Ajax-based web application.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
A User Experience Study on C2C E-Commerce Localization in China.
Proceedings of the Usability and Internationalization. Global and Local User Interfaces, 2007

A Static Analysis Framework For Detecting SQL Injection Vulnerabilities.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Recursion detection testing on software components.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Service Oriented Dynamic Decoupling Metrics.
Proceedings of the 2006 International Conference on Semantic Web & Web Services, 2006

Asynchronous Callback in Web Services.
Proceedings of the Seventh International Conference on Software Engineering, 2006

Adapter Pattern in Component and Service Levels vs. Class and Object Levels.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Recursion Detection Testing on Software Components.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

An Incremental, Spiral, Topic-Driven Approach -- Designing labs and projects for a Web technology course.
Proceedings of the 2006 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2006

Decoupling Metrics for Services Composition.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

2005
Enhanced water level model in image classification.
Proceedings of the Visual Information Processing XIV, 2005

2004
Water-level model in density-based unsupervised classification.
Proceedings of the Visual Information Processing XIII, Orlando, FL, USA, April 12, 2004, 2004

Design Patterns for Web Services.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

2003
Some Experiments on Peer Group Pixels Based Spatial Classifier.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

2002
A Parallel Prefix Convex Hill Algorithm Using MasPar.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Component based development of UDBC.
Proceedings of the Companion of the 17th annual ACM SIGPLAN conference on Object-oriented programming, 2002

A spatial classification algorithm using peer group pixels.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002

2000
Polynomial morphological approach in pattern recognition.
Proceedings of the Visual Information Processing IX, Orlando, FL, USA, April 24, 2000, 2000

1999
Gray Image Skeletonization with Hollow Preprocessing Using Distance Transformation.
Int. J. Pattern Recognit. Artif. Intell., 1999

1998
Three-dimensional skeletonization using distance transform.
Proceedings of the Visual Information Processing VII, Orlando, FL, USA, April 13, 1998, 1998

1997
Skeletonization of gray-scale images by gray weighted distance transform.
Proceedings of the Visual Information Processing VI, Orlando, FL, USA, April 21, 1997, 1997

1993
An algebraic approach for morphological operations on 2D and 3D images.
Pattern Recognit., 1993

1992
A 3D object recognition system using voxel representation.
Pattern Recognit. Lett., 1992

A template polynomial approach for image processing and visual recognition.
Pattern Recognit., 1992

Determining holes and connectivity in binary images.
Comput. Graph., 1992

1991
An algebraic method for processing colored images.
Pattern Recognit. Lett., 1991

3-D vision algorithms based on polynomial representation(abstract and references only).
Proceedings of the 19th annual conference on Computer Science, 1991

1990
Binary image processing by polynomial approach.
Pattern Recognit. Lett., 1990

Software Development: Image Processing by Template Polynomials.
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990


  Loading...