From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The L-fuzzy vector subspace degrees and its induced convex structure., и . Comput. Appl. Math., 43 (3): 131 (апреля 2024)Dominance Hierarchies Induce a Population's Full Cooperation., , , и . Dyn. Games Appl., 4 (4): 432-447 (2014)On potentials of regularized Wasserstein generative adversarial networks for realistic hallucination of tiny faces., , , , , , и . Neurocomputing, (2019)Three-Dimensional Encoding Approach for Wearable Tactile Communication Devices., , , , , и . Sensors, 22 (24): 9568 (2022)Robust Transmissions in Wireless Powered Multi-Relay Networks with Chance Interference Constraints., , , , , и . CoRR, (2018)Linear precoding for finite-alphabet inputs over MIMO interference channels by exploiting SCSI., , и . ICCS, стр. 1-6. IEEE, (2016)Distribution of uplink inter-cell interference in OFDMA networks with power control., , , , и . ICC, стр. 5729-5734. IEEE, (2014)Secure Transmission for GPQSM System Exploiting Artificial Noise and Signal Space Diversity., , , и . VTC Spring, стр. 1-5. IEEE, (2018)Certificateless Public-Key Signature: Security Model and Efficient Construction., , , и . ACNS, том 3989 из Lecture Notes in Computer Science, стр. 293-308. (2006)A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks., , и . SECRYPT, стр. 269-274. SciTePress, (2011)