From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Filtering Out Unfair Ratings in Bayesian Reputation Systems, , и . The Icfain Journal of Management Research, 4 (2): 48-64 (февраля 2005)MAC-Layer Rate Control for 802.11 Networks: Lesson Learned and Looking Forward., , , , и . CoRR, (2018)A Simulation Study of Resource Addressing Methods for a Distributed Operating System., и . Angew. Inform., 31 (6): 244-254 (1989)Automating Context-aware Application Development, , и . In: UbiComp 1st International Workshop on Advanced Context Modelling, Reasoning and Management, стр. 90--95. (2004)Efficient topology discovery in OpenFlow-based Software Defined Networks., , , и . Comput. Commun., (2016)Special section on human activity recognition.. Pervasive Mob. Comput., 8 (1): 67 (2012)Modeling and using imperfect context information, и . Second IEEE International Conference on Pervasive Computing and Communications. Workshop on Context Modelling and Reasoning (CoMoRea 04), стр. 33-37. IEEE Computer Society, (2004)A Context-Sensitive Service Discovery Protocol for Mobile Computing Environments., и . ICMB, стр. 565-572. IEEE Computer Society, (2005)Context Obfuscation for Privacy via Ontological Descriptions., , и . LoCA, том 3479 из Lecture Notes in Computer Science, стр. 276-288. Springer, (2005)A performance study of hybrid protocols for opportunistic communications., , , , и . LCN Workshops, стр. 9-16. IEEE Computer Society, (2013)