From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research on line loss analysis and intelligent diagnosis of abnormal causes in distribution networks: artificial intelligence based method., , , , , , и . PeerJ Comput. Sci., (2023)Generation of multiparticle entangled states of nitrogen-vacancy centers with carbon nanotubes., , , , и . Quantum Inf. Process., 19 (8): 223 (2020)Survey and Performance Evaluation of the Upcoming Next Generation WLAN Standard - IEEE 802.11ax., , , , , , , , , и 3 other автор(ы). CoRR, (2018)Generalized Format-Preserving Encryption for Character Data., , , , и . CloudComp, том 197 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 113-122. Springer, (2016)TAHES: A Truthful Double Auction Mechanism for Heterogeneous Spectrums., , , , и . IEEE Trans. Wirel. Commun., 11 (11): 4038-4047 (2012)Neighbor discovery in mobile ad hoc self-configuring networks with directional antennas: algorithms and comparisons., и . IEEE Trans. Wirel. Commun., 7 (5-1): 1540-1549 (2008)Visible Infrared Cross-Modality Person Re-Identification Network Based on Adaptive Pedestrian Alignment., , , , и . IEEE Access, (2019)An Adaptive Fusion Algorithm for Visible and Infrared Videos Based on Entropy and the Cumulative Distribution of Gray Levels., , , , и . IEEE Trans. Multim., 19 (12): 2706-2719 (2017)Vertex-centric Parallel Algorithms for Identifying Key Vertices in Large-Scale Graphs., , , , и . HPCC/CSS/ICESS, стр. 225-231. IEEE, (2015)Optimization and Benchmark of Cryptographic Algorithms on Network Processors., , , и . IEEE Micro, 24 (5): 55-69 (2004)