From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Highly Secure IoT Firmware Update Mechanism Using Blockchain., , и . Sensors, 22 (2): 530 (2022)Distance-increasing mappings from binary vectors to permutations that increase hamming distances by at least two.. IEEE Trans. Inf. Theory, 52 (4): 1683-1689 (2006)Constructing Constant Composition Codes via Distance-Increasing Mappings., и . SIAM J. Discret. Math., 26 (1): 375-383 (2012)Distance-Preserving and Distance-Increasing Mappings From Ternary Vectors to Permutations., , , и . IEEE Trans. Inf. Theory, 54 (3): 1334-1339 (2008)Application-Layer Conference Trees for Multimedia Multipoint Conferences Using Megaco/H.248., и . ICME, IEEE Computer Society, (2001)On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory., , и . UIC/ATC, стр. 613-618. IEEE Computer Society, (2013)Smart bird identification system based on a hybrid approach: Petri nets, convolutional neural and deep residual networks., , и . Multim. Tools Appl., 83 (12): 34795-34823 (апреля 2024)Application-Layer conference trees for multimedia multipoint conferences using megaco/H.248., , и . IEEE Trans. Multim., 7 (5): 951-959 (2005)New Algorithms of Distance-Increasing Mappings from Binary Vectors to Permutations by Swaps.. Des. Codes Cryptogr., 39 (3): 335-345 (2006)A New Approximation Algorithm for the d-dimensional Knapsack Problem Based on Hopfield Networks., , и . IIH-MSP (1), том 109 из Smart Innovation, Systems and Technologies, стр. 35-44. Springer, (2018)