From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Personalized Classifier Ensemble Pruning Framework for Mobile Crowdsourcing., , , , и . CoRR, (2017)Truthful Incentive Mechanism for Nondeterministic Crowdsensing with Vehicles., , , , и . IEEE Trans. Mob. Comput., 17 (12): 2982-2997 (2018)Wireless fire monitoring system for ancient buildings., , , , , , и . Infoscale, том 304 из ACM International Conference Proceeding Series, стр. 42. ACM, (2007)Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN., , , , , и . IEEE/ACM Trans. Netw., 25 (3): 1861-1875 (2017)Recognizing the Operating Hand and the Hand-Changing Process for User Interface Adjustment on Smartphones., , , и . Sensors, 16 (8): 1314 (2016)A Utility-Optimized Framework for Personalized Private Histogram Estimation., , , , , и . IEEE Trans. Knowl. Data Eng., 31 (4): 655-669 (2019)Automated Vulnerability Management through Web Services., , , и . GCC (1), том 3032 из Lecture Notes in Computer Science, стр. 1067-1070. Springer, (2003)Exploiting Cantor Expansion for Covert Channels over LTE-Advanced., , , и . ICONIP (5), том 10638 из Lecture Notes in Computer Science, стр. 878-887. Springer, (2017)Personalized Privacy-Preserving Data Aggregation for Histogram Estimation., , , , , и . GLOBECOM, стр. 1-6. IEEE, (2015)Steganalysis against substitution-based linguistic steganography based on context clusters., , , , и . Comput. Electr. Eng., 37 (6): 1071-1081 (2011)