From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Malware Threats and Detection for Industrial Mobile-IoT Networks., , , , и . IEEE Access, (2018)FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning., , , , , и . Multim. Tools Appl., 82 (30): 46611-46650 (декабря 2023)Scalable RFID security framework and protocol supporting Internet of Things., , и . Comput. Networks, (2014)Enhancing Big Social Media Data Quality for Use in Short-Text Topic Modeling., , , , , и . IEEE Access, (2022)IADE: An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G Network., , , и . IEEE Trans. Green Commun. Netw., 5 (4): 1747-1760 (2021)QoS-based adaptation service selection broker., и . Future Gener. Comput. Syst., 27 (3): 256-264 (2011)A RFID architecture framework for global supply chain applications., и . iiWAS, стр. 313-320. ACM, (2009)An Efficient Replicated Data Management Approach for Peer-to-Peer Systems.. International Conference on Computational Science (3), том 3516 из Lecture Notes in Computer Science, стр. 457-463. Springer, (2005)A Survey of Big Workflow., , , и . DaEng, том 520 из Lecture Notes in Electrical Engineering, стр. 529-539. Springer, (2015)Adaptive parallel I/O scheduling algorithm for multiprogrammed systems.. Future Gener. Comput. Syst., 22 (5): 611-619 (2006)