From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Mobile Application Using Deep Learning to Automatically Classify Adult-Only Images., , , и . AIMS, том 12401 из Lecture Notes in Computer Science, стр. 140-155. Springer, (2020)Security-enabled Enactment of Decentralized Workflows., , и . SIN, стр. 49-56. ACM, (2016)Modelling Dynamic Distributed Systems in LOTOS.. FBT, стр. 203-212. Herbert Utz Verlag, (1999)Towards Decentralised Security Policies for e-Health Collaborations., , и . SECURWARE, стр. 165-172. IEEE Computer Society, (2008)IRMS: An intelligent rule management scheme for software defined networking., , , , , и . INFOCOM Workshops, стр. 742-747. IEEE, (2017)TruXy: Trusted Storage Cloud for Scientific Workflows., , , , , , , и . IEEE Trans. Cloud Computing, 5 (3): 428-442 (2017)Cost-Efficient Stream Processing on the Cloud., , , и . CLOUD, стр. 209-213. IEEE, (2019)Data Curation Standards and Social Science Occupational Information Resources., , , , , и . IJDC, 2 (1): 73-91 (2007)Frameworks: the future of formal software development?. Comput. Stand. Interfaces, 19 (7): 375-385 (1998)Efficient and Secure Federated Learning With Verifiable Weighted Average Aggregation., , , , и . IEEE Trans. Netw. Sci. Eng., 10 (1): 205-222 (2023)