From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Applying Forward Security and Threshold Cryptography in Ad Hoc Networks., , , , и . International Conference on Wireless Networks, стр. 202-209. CSREA Press, (2004)Indexing Useful Structural Patterns for XML Query Processing., , , и . IEEE Trans. Knowl. Data Eng., 17 (7): 997-1009 (2005)Signcryption in Hierarchical Identity Based Cryptosystem., , , и . SEC, том 181 из IFIP, стр. 443-457. Springer, (2005)Reconstructing One-Articulated Networks with Distance Matrices., , , и . J. Comput. Biol., 25 (3): 253-269 (2018)Filtering of false positive microRNA candidates by a clustering-based approach., , , и . BMC Bioinform., (2008)The mutated subsequence problem and locating conserved genes., , , , , и . Bioinform., 21 (10): 2271-2278 (2005)eCX: a secure infrastructure for e-course delivery., , , и . Internet Res., 13 (2): 116-125 (2003)Exponent-inversion Signatures and IBE under Static Assumptions., , , и . IACR Cryptology ePrint Archive, (2014)BMCMDA: a novel model for predicting human microbe-disease associations via binary matrix completion., , , , и . BMC Bioinform., 19-S (9): 169-176 (2018)Finding Alternative Splicing Patterns with Strong Support from expressed Sequences on Individual exons/introns., , , и . J. Bioinform. Comput. Biol., 6 (5): 1021-1033 (2008)