From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Formal security policy implementations in network firewalls., , , , , и . Comput. Secur., 31 (2): 253-270 (2012)Underwater image enhancement using scale-patch synergy transformer., и . Signal Image Video Process., 18 (4): 3411-3420 (июня 2024)Research on Long-Term Tidal-Height-Prediction-Based Decomposition Algorithms and Machine Learning Models., , , , и . Remote. Sens., 15 (12): 3045 (июня 2023)N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network., , , , , , и . IEEE Trans. Comput. Soc. Syst., 6 (3): 456-466 (2019)Study on Motion Control Problems for 3-DOF Underactuated Cart-Double Pendulum System., , , , и . IEEE Trans. Circuits Syst. II Express Briefs, 71 (1): 176-180 (января 2024)Do self-supervised speech and language models extract similar representations as human brain?, , , , , и . CoRR, (2023)Likelihood-Aware Semantic Alignment for Full-Spectrum Out-of-Distribution Detection., , , , и . CoRR, (2023)MoNet: Motion-based Point Cloud Prediction Network., , , , , и . CoRR, (2020)Sufficient Exploration for Convex Q-learning., , , и . CoRR, (2022)Computer Vision Syndrome: A widely spreading but largely unknown epidemic among computer users., , , и . Comput. Hum. Behav., 24 (5): 2026-2042 (2008)