default search action
Borko Furht
Person information
- affiliation: Florida Atlantic University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Fangming Qu, Nolan Dang, Borko Furht, Mehrdad Nojoumian:
Comprehensive study of driver behavior monitoring systems using computer vision and machine learning techniques. J. Big Data 11(1): 32 (2024) - [i5]Vivek Ganesh Sonar, Muhammad Tanveer Jan, Mike Wells, Abhijit S. Pandya, Gabriela Engstrom, Richard Shih, Borko Furht:
Estimating Body Volume and Height Using 3D Data. CoRR abs/2410.02800 (2024) - 2023
- [j46]Divya Gangwani, Xingquan Zhu, Borko Furht:
Exploring investor-business-market interplay for business success prediction. J. Big Data 10(1): 48 (2023) - [j45]Zoran Babovic, Branislav Bajat, Vladan Dokic, Filip Dordevic, Drazen Draskovic, Nenad Filipovic, Borko Furht, Nikola Gacic, Igor Ikodinovic, Marija Ilic, Ayhan Irfanoglu, Branislav Jelenkovic, Aleksandar Kartelj, Gerhard Klimeck, Nenad Korolija, Milos Kotlar, Milos Kovacevic, Vladan Kuzmanovic, Marko Marinkovic, Slobodan Markovic, Avi Mendelson, Veljko Milutinovic, Aleksandar Neskovic, Natasa Neskovic, Nenad Mitic, Bosko Nikolic, Konstantin Novoselov, Arun Prakash, Ivan Ratkovic, Zoran Stojadinovic, Andrey Ustyuzhanin, Stanislaw H. Zak:
Research in computing-intensive simulations for nature-oriented civil-engineering and related scientific fields, using machine learning and big data: an overview of open problems. J. Big Data 10(1): 73 (2023) - [j44]Zoran Babovic, Branislav Bajat, Dusan Barac, Vesna Bengin, Vladan Dokic, Filip Dordevic, Drazen Draskovic, Nenad Filipovic, Stephan French, Borko Furht, Marija Ilic, Ayhan Irfanoglu, Aleksandar Kartelj, Milan Kilibarda, Gerhard Klimeck, Nenad Korolija, Milos Kotlar, Milos Kovacevic, Vladan Kuzmanovic, Jean-Marie Lehn, Dejan Madic, Marko Marinkovic, Miodrag M. Spalevic, Avi Mendelson, Fedor Mesinger, Gradimir V. Milovanovic, Veljko Milutinovic, Nenad Mitic, Aleksandar Neskovic, Natasa Neskovic, Bosko Nikolic, Konstantin Novoselov, Arun Prakash, Jelica Protic, Ivan Ratkovic, Diego Rios, Dan Shechtman, Zoran Stojadinovic, Andrey Ustyuzhanin, Stanislaw H. Zak:
Teaching computing for complex problems in civil engineering and geosciences using big data and machine learning: synergizing four different computing paradigms and four different management domains. J. Big Data 10(1): 89 (2023) - [i4]Muhammad Tanveer Jan, Sonia Moshfeghi, Joshua William Conniff, Jinwoo Jang, KwangSoo Yang, Jiannan Zhai, Monica Rosselli, David Newman, Ruth Tappen, Borko Furht:
Methods and Tools for Monitoring Driver's Behavior. CoRR abs/2301.12269 (2023) - [i3]Sonia Moshfeghi, Muhammad Tanveer Jan, Joshua William Conniff, Seyedeh Gol Ara Ghoreishi, Jinwoo Jang, Borko Furht, KwangSoo Yang, Monica Rosselli, David Newman, Ruth Tappen, Dana Smith:
In-vehicle Sensing and Data Analysis for Older Drivers with Mild Cognitive Impairment. CoRR abs/2311.09273 (2023) - [i2]Seyedeh Gol Ara Ghoreishi, Sonia Moshfeghi, Muhammad Tanveer Jan, Joshua William Conniff, KwangSoo Yang, Jinwoo Jang, Borko Furht, Ruth Tappen, David Newman, Monica Rosselli, Jiannan Zhai:
Anomalous Behavior Detection in Trajectory Data of Older Drivers. CoRR abs/2311.17822 (2023) - 2022
- [b8]Nataliia Neshenko, Elias Bou-Harb, Borko Furht:
Smart Cities: Cyber Situational Awareness to Support Decision Making. Springer 2022, ISBN 978-3-031-18463-5, pp. 3-129 - [c49]Muhammad Tanveer Jan, Sonia Moshfeghi, Joshua William Conniff, Jinwoo Jang, KwangSoo Yang, Jiannan Zhai, Monica Rosselli, David Newman, Ruth Tappen, Borko Furht:
Methods and Tools for Monitoring Driver's Behavior. CSCI 2022: 1269-1273 - [c48]Muhammad Tanveer Jan, Ali Hashemi, Jinwoo Jang, KwangSoo Yang, Jiannan Zhai, David Newman, Ruth Tappen, Borko Furht:
Non-intrusive Drowsiness Detection Techniques and Their Application in Detecting Early Dementia in Older Drivers. FTC (2) 2022: 776-796 - 2021
- [j43]Nataliia Neshenko, Elias Bou-Harb, Borko Furht:
A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs. Digit. Investig. 37 Supplement: 301198 (2021) - [j42]Connor Shorten, Taghi M. Khoshgoftaar, Borko Furht:
Deep Learning applications for COVID-19. J. Big Data 8(1): 1-54 (2021) - [j41]Flavio Villanustre, Arjuna Chala, Roger Dev, Lili Xu, Jesse Shaw, Borko Furht, Taghi M. Khoshgoftaar:
Modeling and tracking Covid-19 cases using Big Data analytics on HPCC system platformm. J. Big Data 8(1): 33 (2021) - [j40]Murtadha D. Hssayeni, Arjuna Chala, Roger Dev, Lili Xu, Jesse Shaw, Borko Furht, Behnaz Ghoraani:
The forecast of COVID-19 spread risk at the county level. J. Big Data 8(1): 99 (2021) - [j39]Connor Shorten, Taghi M. Khoshgoftaar, Borko Furht:
Text Data Augmentation for Deep Learning. J. Big Data 8(1): 101 (2021) - 2020
- [j38]Nataliia Neshenko, Christelle Nader, Elias Bou-Harb, Borko Furht:
A survey of methods supporting cyber situational awareness in the context of smart cities. J. Big Data 7(1): 92 (2020) - [c47]Borko Furht:
In the Middle of the Patent War for the Next Generation of Video Coding Standard. MECO 2020: 1
2010 – 2019
- 2019
- [j37]Victor M. Herrera, Taghi M. Khoshgoftaar, Flavio Villanustre, Borko Furht:
Random forest implementation and optimization for Big Data analytics on LexisNexis's high performance computing cluster platform. J. Big Data 6: 68 (2019) - 2018
- [b7]Borko Furht, Esad Akar, Whitney Angelica Andrews:
Digital Image Processing: Practical Approach. Springer Briefs in Computer Science, Springer 2018, ISBN 978-3-319-96633-5, pp. 1-90 - [j36]Jack Burdick, Oge Marques, Janet Weinthal, Borko Furht:
Rethinking Skin Lesion Segmentation in a Convolutional Classifier. J. Digit. Imaging 31(4): 435-440 (2018) - 2016
- [b6]Natasha Petrovska, Aleksandar Stevanovic, Borko Furht:
Innovative Web Applications for Analyzing Traffic Operations. Springer Briefs in Computer Science, Springer 2016, ISBN 978-3-319-33318-2, pp. 1-48 - [j35]Esfandiar Zolghadr, Borko Furht:
Context-Based Scene Understanding. Int. J. Multim. Data Eng. Manag. 7(1): 22-40 (2016) - [p8]Borko Furht, Flavio Villanustre:
Introduction to Big Data. Big Data Technologies and Applications 2016: 3-11 - [p7]Anthony M. Middleton, David Alan Bayliss, Gavin Halliday, Arjuna Chala, Borko Furht:
The HPCC/ECL Platform for Big Data. Big Data Technologies and Applications 2016: 159-183 - [p6]Flavio Villanustre, Borko Furht:
Social Network Analytics: Hidden and Complex Fraud Schemes. Big Data Technologies and Applications 2016: 341-346 - [p5]Jesse Shaw, Flavio Villanustre, Borko Furht, Ankur Agarwal, Abhishek Jain:
Modeling Ebola Spread and Using HPCC/KEL System. Big Data Technologies and Applications 2016: 347-385 - [e10]Borko Furht, Flavio Villanustre:
Big Data Technologies and Applications. Springer 2016, ISBN 978-3-319-44548-9 [contents] - 2014
- [b5]David Jaramillo, Borko Furht, Ankur Agarwal:
Virtualization Techniques for Mobile Systems. Florida Atlantic University, Boca Raton, FL, USA, Multimedia Systems and Applications, Springer 2014, ISBN 978-3-319-05740-8, pp. 1-68 - [b4]Aleksandar Colic, Oge Marques, Borko Furht:
Driver Drowsiness Detection - Systems and Solutions. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-11534-4, pp. 1-50 - [j34]Osman Salem, Alexey Guerassimov, Ahmed Mehaoua, Anthony Marcus, Borko Furht:
Anomaly Detection in Medical Wireless Sensor Networks using SVM and Linear Regression Models. Int. J. E Health Medical Commun. 5(1): 20-45 (2014) - [j33]Reena Friedel, Oscar Figuerola Salas, Hari Kalva, Borko Furht:
Asset identification using image descriptors. Multim. Tools Appl. 73(3): 2201-2221 (2014) - [c46]Aleksandar Colic, Oge Marques, Borko Furht:
Design and Implementation of a Driver Drowsiness Detection System - A Practical Approach. SIGMAP 2014: 241-247 - [i1]Anthony Marcus, Ionut Cardei, Borko Furht, Osman Salem, Ahmed Mehaoua:
A Mobile Device Prototype Application for the Detection and Prediction of Node Faults in Wireless Sensor Networks. CoRR abs/1401.5306 (2014) - 2013
- [c45]Osman Salem, Alexey Guerassimov, Ahmed Mehaoua, Anthony Marcus, Borko Furht:
Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. ICC 2013: 4373-4378 - [c44]Velibor Adzic, Hari Kalva, Borko Furht:
Exploring visual temporal masking for video compression. ICCE 2013: 590-591 - [c43]Velibor Adzic, Hari Kalva, Borko Furht:
Temporal visual masking for HEVC/H.265 perceptual optimization. PCS 2013: 430-433 - [e9]Borko Furht, Ankur Agarwal:
Handbook of Medical and Healthcare Technologies. Springer 2013, ISBN 978-1-4614-8494-3 [contents] - [r13]Ankur Agarwal, Borko Furht, Mamata Yenagi:
Mobile Medical and Healthcare Applications. Handbook of Medical and Healthcare Technologies 2013: 3-15 - [r12]Osman Salem, Alexey Guerassimov, Ahmed Mehaoua, Anthony Marcus, Borko Furht:
Anomaly Detection Scheme for Medical Wireless Sensor Networks. Handbook of Medical and Healthcare Technologies 2013: 207-222 - [r11]Timothy Cyr, Ankur Agarwal, Borko Furht:
Brief Overview of Various Healthcare Tools, Methods, Framework and Standards. Handbook of Medical and Healthcare Technologies 2013: 285-295 - [r10]Ravi S. Behara, Ankur Agarwal, Faiz Fatteh, Borko Furht:
Predicting Hospital Readmission Risk for COPD Using EHR Information. Handbook of Medical and Healthcare Technologies 2013: 297-308 - [r9]Ankur Agarwal, Borko Furht, Mark Conatser, Chris Baechle:
Secure Mobile Framework for Monitoring Medical Sensor Data. Handbook of Medical and Healthcare Technologies 2013: 355-369 - [r8]Ankur Agarwal, Borko Furht, Vivek Tyagi:
Integration of Various Health Record Systems. Handbook of Medical and Healthcare Technologies 2013: 503-528 - 2012
- [j32]Velibor Adzic, Hari Kalva, Borko Furht:
Optimizing video encoding for adaptive streaming over HTTP. IEEE Trans. Consumer Electron. 58(2): 397-403 (2012) - [c42]Borko Furht:
Industry Multimedia Projects. DMS 2012 - [c41]Velibor Adzic, Hari Kalva, Borko Furht:
Content aware video encoding for adaptive HTTP streaming. ICCE 2012: 92-93 - [c40]Hari Kalva, Velibor Adzic, Borko Furht:
Comparing MPEG AVC and SVC for adaptive HTTP streaming. ICCE 2012: 158-159 - 2011
- [j31]Ramesh C. Jain, Alberto Del Bimbo, Tat-Seng Chua, Borko Furht:
Survey papers in multimedia - guest editorial. Multim. Tools Appl. 51(1): 1-4 (2011) - [j30]Julie Carmigniani, Borko Furht, Marco Anisetti, Paolo Ceravolo, Ernesto Damiani, Misa Ivkovic:
Augmented reality technologies, systems and applications. Multim. Tools Appl. 51(1): 341-377 (2011) - [j29]Velibor Adzic, Hari Kalva, Borko Furht:
A survey of multimedia content adaptation for mobile devices. Multim. Tools Appl. 51(1): 379-396 (2011) - [j28]Ramesh C. Jain, Alberto Del Bimbo, Tat-Seng Chua, Borko Furht:
Hot research topics - guest editorial. Multim. Tools Appl. 51(2): 397-400 (2011) - [j27]Hari Kalva, Aleksandar Colic, Adriana Garcia, Borko Furht:
Parallel programming for multimedia applications. Multim. Tools Appl. 51(2): 801-818 (2011) - [p4]Julie Carmigniani, Borko Furht:
Augmented Reality: An Overview. Handbook of Augmented Reality 2011: 3-46 - [e8]Borko Furht:
Handbook of Augmented Reality. Springer 2011, ISBN 978-1-4614-0063-9 [contents] - 2010
- [c39]Ricardo Castellanos, Hari Kalva, Oge Marques, Borko Furht:
Event detection in video using motion analysis. ARTEMIS@ACM Multimedia 2010: 57-62 - [c38]Aleksandar Colic, Hari Kalva, Borko Furht:
Exploring NVIDIA-CUDA for video coding. MMSys 2010: 13-22 - [p3]Borko Furht:
Cloud Computing Fundamentals. Handbook of Cloud Computing 2010: 3-19 - [p2]Ankur Agarwal, Nathan Henehan, Vivek Somashekarappa, Abhijit S. Pandya, Hari Kalva, Borko Furht:
A Cloud Computing Based Patient Centric Medical Information System. Handbook of Cloud Computing 2010: 553-573 - [p1]Karuna P. Joshi, Yelena Yesha, A. Ant Ozok, Yaacov Yesha, Ashwini Lahane, Hari Kalva, Ankur Agarwal, Borko Furht:
User-Centric Smart Services in the Cloud. The Smart Internet 2010: 234-249 - [e7]Borko Furht, Armando Escalante:
Handbook of Cloud Computing. Springer 2010, ISBN 978-1-4419-6523-3 [contents] - [e6]Borko Furht:
Handbook of Social Network Technologies and Applications. Springer 2010, ISBN 978-1-4419-7141-8 [contents]
2000 – 2009
- 2009
- [c37]Gustavo Leon, Hari Kalva, Borko Furht:
Video identification using video tomography. ICME 2009: 1030-1033 - [c36]Seyed Masoud Sadjadi, Shuyi Chen, Scott Graham, Steven Luis, Yi Deng, Borko Furht, Pele Martinez, Nick Bowen, Juan Caraballo:
PIRE: a global living laboratory for cyberinfrastructure application enablement. Richard Tapia Celebration of Diversity in Computing Conference 2009: 64-69 - [e5]Borko Furht:
Handbook of Multimedia for Digital Entertainment and Arts. Springer 2009, ISBN 978-0-387-89023-4 [contents] - 2008
- [c35]Hari Kalva, Borko Furht:
Architecting ambient intelligence systems. HCC 2008: 57-60 - [e4]Borko Furht:
Encyclopedia of Multimedia, 2nd Ed. Springer 2008, ISBN 978-0-387-74724-8 [contents] - [e3]Borko Furht:
Encyclopedia of Wireless and Mobile Communications. Taylor & Francis 2008, ISBN 1-4200-4326-9 [contents] - [r7]Hari Kalva, Borko Furht:
Hypercube-Based Multi-view Video Coding. Encyclopedia of Multimedia 2008: 294-299 - [r6]Sanigepalli Praveenkumar, Hari Kalva, Borko Furht:
Mobile Broadcast Multicast Services. Encyclopedia of Multimedia 2008: 426-428 - [r5]Hari Kalva, Lakis Christodoulou, Liam M. Mayron, Oge Marques, Borko Furht:
Three Dimensional Television Services. Encyclopedia of Multimedia 2008: 864-868 - [r4]Borko Furht:
Three-Dimensional Video Visualization and Navigation System. Encyclopedia of Multimedia 2008: 869-873 - [r3]Sanigepalli Praveenkumar, Hari Kalva, Borko Furht:
Video Error Resilience Techniques for MBMS. Encyclopedia of Multimedia 2008: 918-922 - [r2]Borko Furht, Mohammad Ilyas:
Wireless Internet: Fundamentals. Encyclopedia of Wireless and Mobile Communications 2008 - [r1]Borko Furht, Hari Kalva, Praveen Sanigepalli:
Multimedia Broadcast Multicast Service (MBMS). Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [j26]Daniel Socek, Spyros S. Magliveras, Dubravko Culibrk, Oge Marques, Hari Kalva, Borko Furht:
Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations. EURASIP J. Inf. Secur. 2007 (2007) - [j25]Daniel Socek, Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht:
New approaches to encryption and steganography for digital videos. Multim. Syst. 13(3): 191-204 (2007) - [j24]Dubravko Culibrk, Oge Marques, Daniel Socek, Hari Kalva, Borko Furht:
Neural Network Approach to Background Modeling for Video Object Segmentation. IEEE Trans. Neural Networks 18(6): 1614-1627 (2007) - [c34]Dubravko Culibrk, Daniel Socek, Oge Marques, Borko Furht:
Automatic kernel width selection for neural network based video object segmentation. VISAPP (2) 2007: 472-479 - 2006
- [b3]Borko Furht, Darko Kirovski:
Multimedia encryption and authentication - techniques and applications. Auerbach Publ. 2006, ISBN 978-0-8493-7212-4, pp. 1-395 - [j23]Sanigepalli Praveenkumar, Hari Kalva, Borko Furht:
Error resilient video over multimedia broadcast multicast services (MBMS). Multim. Tools Appl. 28(1-2): 187-201 (2006) - [c33]Daniel Socek, Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht:
A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos. ICIAR (1) 2006: 547-558 - [c32]Edin A. Muharemagic, Borko Furht:
An Innovative Pixel Scoring Method for Watermarking of Binary Document Images. ICME 2006: 1589-1592 - [c31]Praveen Sanigepalli, Hari Kalva, Borko Furht:
Using P2P Networks for Error Recovery in MBMS Applications. ICME 2006: 1685-1688 - [c30]Hari Kalva, Lakis Christodoulou, Liam M. Mayron, Oge Marques, Borko Furht:
Challenges and Opportunities in Video Coding for 3D TV. ICME 2006: 1689-1692 - [c29]Daniel Socek, Dubravko Culibrk, Hari Kalva, Oge Marques, Borko Furht:
Permutation-Based Low-Complexity Alternate Coding in Multi-View H.264/AVC. ICME 2006: 2141-2144 - [c28]Lakis Christodoulou, Liam M. Mayron, Hari Kalva, Oge Marques, Borko Furht:
3D TV using MPEG-2 and H.264 view coding and autostereoscopic displays. ACM Multimedia 2006: 505-506 - [c27]Hari Kalva, Lakis Christodoulou, Liam M. Mayron, Oge Marques, Borko Furht:
Design and evaluation of a 3D video system based on H.264 view coding. NOSSDAV 2006: 12 - [c26]Dubravko Culibrk, Oge Marques, Daniel Socek, Hari Kalva, Borko Furht:
A neural network approach to bayesian background modeling for video object segmentation. VISAPP (1) 2006: 474-479 - [e2]Borko Furht:
Encyclopedia of Multimedia. Springer 2006, ISBN 978-0-387-24395-5 [contents] - 2005
- [b2]Borko Furht, Edin Muharemagic, Daniel Socek:
Multimedia encryption and watermarking. Multimedia systems and applications 28, Springer 2005, ISBN 978-0-387-24425-9 - [j22]Hari Kalva, Borko Furht:
Complexity Estimation of the H.264 Coded Video Bitstreams. Comput. J. 48(5): 504-513 (2005) - [c25]Daniel Socek, Dubravko Culibrk, Oge Marques, Hari Kalva, Borko Furht:
A Hybrid Color-Based Foreground Object Detection Method for Automated Marine Surveillance. ACIVS 2005: 340-347 - [c24]Sanigepalli Praveenkumar, Hari Kalva, Borko Furht:
A modified video codec for MBMS applications. MUM 2005: 150-157 - [c23]Daniel Socek, Shujun Li, Spyros S. Magliveras, Borko Furht:
Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption. SecureComm 2005: 406-407 - 2004
- [c22]Joshua H. Greenberg, Douglas D. Dankel II, Borko Furht:
A Content Oriented Architecture for Consumer-to-Business E-Commerce. ICEIS (4) 2004: 16-23 - [c21]Abu Asaduzzaman, Imad Mahgoub, Praveen Sanigepalli, Hari Kalva, Ravi Shankar, Borko Furht:
Cache optimization for mobile devices running multimedia applications. ISMSE 2004: 499-506 - [c20]Sanigepalli Praveenkumar, Hari Kalva, Borko Furht:
Application of video error resilience techniques for mobile broadcast multicast services (MBMS). ISMSE 2004: 507-512 - 2003
- [c19]Borko Furht, Oge Marques:
Image and Video Databases Track Editorial. SAC 2003: 759 - [c18]Borko Furht, Ken Gustafson, Hesong Huang, Oge Marques:
An Adaptive Three-Dimensional DCT Compression Based on Motion Analysis. SAC 2003: 765-768 - 2002
- [j21]Oge Marques, Borko Furht:
MUSE: A Content-Based Image Search and Retrieval System Using Relevance Feedback. Multim. Tools Appl. 17(1): 21-50 (2002) - [c17]Xiuqi Li, Shu-Ching Chen, Mei-Ling Shyu, Borko Furht:
An Effective Content-Based Visual Image Retrieval System. COMPSAC 2002: 914-919 - [c16]Oge Marques, Borko Furht:
Combining Clustering and Relevance Feedback Techniques in Content-based Image Retrieval. IMSA 2002: 306-311 - [c15]Xiuqi Li, Shu-Ching Chen, Mei-Ling Shyu, Sheng-Tun Li, Borko Furht:
A Novel Hierarchical Approach to Image Retrieval Using Color and Spatial Information. IEEE Pacific Rim Conference on Multimedia 2002: 175-182 - 2001
- [c14]Borko Furht, Jim Sheen, Zijad Aganovic:
Internet-based Delivery and Deployment of Document Management Systems. HICSS 2001 - 2000
- [c13]Borko Furht, Chris Phoenix, John Yin, Zijad Aganovic:
An Innovative Internet Architecture for Application Service Providers. HICSS 2000
1990 – 1999
- 1999
- [j20]Borko Furht, Raymond Westwater, Jeffrey Ice:
Multimedia Broadcasting over the Internet: Part II-Video Compression. IEEE Multim. 6(1): 85-89 (1999) - [j19]Borko Furht:
Editorial. Multim. Tools Appl. 9(2): 119-120 (1999) - [c12]Borko Furht, Raymond Westwater, Jeffrey Ice:
A New Approach for Radio and Video Broadcasting over the Internet. ICMCS, Vol. 2 1999: 553-558 - [c11]Oge Marques, Borko Furht:
Issues in Designing Contemporary Video Database Systems. IMSA 1999: 43-47 - [c10]Xiuqi Li, Borko Furht:
Design and Implementation of Digital Libraries. IMSA 1999: 213-217 - [e1]Borko Furht:
Internet, Multimedia Systems and Applications, IMSA 1999, October 18-21, 1999, Nassau, The Bahamas. IASTED/ACTA Press 1999, ISBN 0-88986-269-9 [contents] - 1998
- [j18]Borko Furht, Raymond Westwater, Jeffrey Ice:
Multimedia Broadcasting over the Internet: Part I. IEEE Multim. 5(4): 78-82 (1998) - 1997
- [b1]Raymond Westwater, Borko Furht:
Real-time video compression - techniques and algorithms. The Kluwer international series in engineering and computer science 376, Kluwer 1997, ISBN 978-0-7923-9787-8, pp. I-VII, 1-164 - [j17]Borko Furht:
Editorial. Multim. Tools Appl. 5(3): 231 (1997) - 1996
- [j16]Borko Furht:
Video and Image Processing in Multimedia Systems Special Issue. Real Time Imaging 2(1): 1-2 (1996) - [j15]Raymond Westwater, Borko Furht:
TheXYZAlgorithm For Real-Time Compression of Full-Motion Video. Real Time Imaging 2(1): 19-34 (1996) - [c9]Hari Kalva, Borko Furht:
Techniques for Improving the Capacity of Video-On-Demand Systems. HICSS (2) 1996: 308-316 - [c8]Raymond Westwater, Borko Furht:
Three-dimensional DCT video compression technique based on adaptive quantizers. ICECCS 1996: 189- - [c7]Borko Furht, Dragutin Petkovic, Arturo Pizano:
Workshop on multimedia applications (abstract only). SAC 1996: 1 - [c6]Borko Furht:
Interactive television systems. SAC 1996: 7-11 - 1995
- [j14]Borko Furht, Devendra Kalra, Frederick L. Kitson, Arturo A. Rodriguez, William E. Wall:
Design Issues for Interactive Television Systems. Computer 28(5): 25-39 (1995) - [j13]Borko Furht:
Where Are Information Superhighways Headed? ACM Comput. Surv. 27(4): 552-556 (1995) - [j12]Borko Furht:
A Survey of Multimedia Compression Techniques and Standards. Part I: JPEG Standard. Real Time Imaging 1(1): 49-67 (1995) - [j11]Borko Furht:
A Survey of Multimedia Compression Techniques and Standards. Part II: Video Compression. Real Time Imaging 1(5): 319-337 (1995) - 1994
- [j10]Borko Furht:
Parallel Computing: Glory and Collapse. Computer 27(11): 74-75 (1994) - [j9]Borko Furht:
Multimedia Systems: An Overview. IEEE Multim. 1(1): 47-59 (1994) - [c5]Lynnau Ehley, Borko Furht, Mohammad Ilyas:
Evaluation of Multimedia Synchronization techniques. ICMCS 1994: 514-519 - 1992
- [c4]Borko Furht:
The Reality of a Real-Time UNIX Operating System. NATO ASI RTC 1992: 503-507 - [c3]Borko Furht:
Next Generation of Real-Time Operating Systems: Industrial Prospective. NATO ASI RTC 1992: 595-596 - [c2]Borko Furht:
Real-Time Systems Theory and Practice Can We Bridge the Gap? NATO ASI RTC 1992: 689-690 - 1991
- [c1]Borko Furht, R. Luken:
The Space Shuttle launch computer control system at NASA Kennedy Space Center. RTS 1991: 184-192 - 1990
- [j8]Steve Geffin, Borko Furht:
A Dataflow Multiprocessor System for Robot Arm Control. Int. J. Robotics Res. 9(3): 93-103 (1990)
1980 – 1989
- 1989
- [j7]Borko Furht:
A contribution to classification and evaluation of structures for parallel computers. Microprocess. Microprogramming 25(1-5): 203-208 (1989) - [j6]Steve Geffin, Borko Furht:
Transputer-based dataflow multiprocessor for robot arm control. Microprocess. Microsystems 13(3): 219-226 (1989) - [j5]Borko Furht, John Parker, Dan Grostick:
Performance of Real/IX - Fully Preemptive Real Time UNIX. ACM SIGOPS Oper. Syst. Rev. 23(4): 45-52 (1989) - 1988
- [j4]Borko Furht, Hatim A. Aboalsamh, Weng Hong Chia, Ying-Nan Lai:
Multiple register window file for lisp-oriented RISC architectures. Microprocess. Microsystems 12(4): 187-196 (1988) - [j3]Guy Rabbat, Borko Furht, Ron Kibler:
Three-dimensional computers and measuring their performance. SIGARCH Comput. Archit. News 16(3): 9-16 (1988) - 1987
- [j2]Borko Furht, Veljko M. Milutinovic:
A Survey of Microprocessor Architectures for Memory Management. Computer 20(3): 48-67 (1987) - 1981
- [j1]Borko Furht, Dragutin Petkovic:
A procedure for multimicroprocessor system testing during development. Microprocess. Microsystems 5(7): 313-317 (1981)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint