From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A quantized kernel least mean square scheme with entropy-guided learning for intelligent data analysis., , , , и . CCIS, стр. 186-190. IEEE, (2016)Layered Synthesis of Latent Gaussian Trees., , , и . CoRR, (2016)Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks., и . GLOBECOM, стр. 161-165. IEEE, (2007)Jamming ACK Attack to Wireless Networks and a Mitigation Approach., , , и . GLOBECOM, стр. 4966-4970. IEEE, (2008)The Propagation of Counteracting Information in Online Social Networks: A Case Study., , , и . ICDM Workshops, стр. 1173-1177. IEEE, (2018)TWOACK: preventing selfishness in mobile ad hoc networks., , и . WCNC, стр. 2137-2142. IEEE, (2005)Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach., , , и . Allerton, стр. 378-384. IEEE, (2016)Generic model control for hybrid energy storage system in electric vehicles., , , и . IECON, стр. 7151-7156. IEEE, (2017)Asymptotic converse bound for secret key capacity in hidden Markov model., , , , и . ISIT, стр. 1968-1972. IEEE, (2017)Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints., , , и . GLOBECOM, стр. 1-6. IEEE, (2015)