From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Internet of Things: Architectural Framework for eHealth Security., , , и . J. ICT Stand., 1 (3): 301-328 (2014)Neural Network Implementation of Admission Control., , и . NIPS, стр. 493-499. Morgan Kaufmann, (1990)The Inside-Out Approach to Infection Control.. Information Systems Security, 14 (6): 33-37 (2006)An Abstraction Methodology for the Evaluation of Multi-core Multi-threaded Architectures., , , , , и . MASCOTS, стр. 478-481. IEEE Computer Society, (2011)Emergent Behaviors in the Internet of Things: The Ultimate Ultra-Large-Scale System., , , , и . IEEE Micro, 36 (6): 36-44 (2016)Call routing to distributed queues: Is FIFO really better than MED?, , и . Telecommun. Syst., 7 (1-3): 299-312 (1997)Advances in the Hierarchical Emergent Behaviors (HEB) Approach to Autonomous Vehicles., , , и . IEEE Intell. Transp. Syst. Mag., 12 (4): 57-65 (2020)Dynamic Network Call Distribution with Periodic Updates, , и . стр. 85-94. (1994)Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing., , , , и . CAMAD, стр. 325-329. IEEE, (2014)Radio Resource Allocation for a High Capacity Vehicular Access Network., , и . VTC Fall, стр. 1-5. IEEE, (2011)