

Author: Saravanakumar S.
Publisher: Inderscience Publishers
ISSN: 2042-3462
Source: International Journal of Multimedia Intelligence and Security, Vol.2, Iss.3-4, 2011-01, pp. : 269-295
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










By Bresson Xavier Vandergheynst Pierre Thiran Jean-Philippe
International Journal of Computer Vision, Vol. 68, Iss. 2, 2006-06 ,pp. :