From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cross-layer analysis for detecting wireless misbehavior., , и . CCNC, стр. 6-9. IEEE, (2006)Trust in Pervasive Computing., , , , и . The Handbook of Mobile Middleware, Auerbach Publications/CRC, (2006)Creating an enhanced reality user interface - ERSolitaire., и . CHI Extended Abstracts, стр. 958-959. ACM, (2003)Threshold-based intrusion detection in ad hoc networks and secure AODV., , , , , и . Ad Hoc Networks, 6 (4): 578-599 (2008)Supporting new product development with the Internet., , и . Ind. Manag. Data Syst., 100 (6): 277-284 (2000)Secure Routing and Intrusion Detection in Ad Hoc Networks., , , , и . PerCom, стр. 191-199. IEEE Computer Society, (2005)Security, Trust, and Privacy in Mobile Computing Environments., , , , и . Mobile Computing Handbook, CRC Press, (2004)Image processing and vision for interaction and UX.. CHI Extended Abstracts, стр. 1033-1034. ACM, (2014)HTML5 game development.. CHI Extended Abstracts, стр. 1011-1012. ACM, (2014)Signature verification Using Stroke Histograms., и . IC-AI, стр. 87-90. CSREA Press, (2002)