From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

High rate fibonacci polynomial codes., , и . ISIT, стр. 1921-1924. IEEE, (2011)Service overlays for Ethernet LAN over SONET/SDH., , , , , и . Opt. Switch. Netw., 7 (2): 54-65 (2010)A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors., и . IEEE Communications Letters, 20 (5): 870-873 (2016)Maximum-Girth Cylinder-Type Block-Circulant LDPC Codes., и . IEEE Trans. Commun., 60 (4): 952-962 (2012)Enterprise Social Networking Platform and Employees' Job Mobility., и . ICIS, Association for Information Systems, (2022)Code-based security with random interleaving., и . IET Commun., 11 (8): 1195-1198 (2017)Supporting security against SYN flooding attacks in distributed denial-of-service via measuring internet protocol flow information export-based traffic., , и . Int. J. Electron. Secur. Digit. Forensics, 2 (1): 49-57 (2009)Advanced crankback provisioning for multi-domain networks., , , и . HPSR, стр. 209-214. IEEE, (2010)The Modeling of Pulsatile Blood Flow as Cross-Williamson and Carreau Fluids in an Artery with a Partial Occlusion., , и . EMS, стр. 191-196. IEEE Computer Society, (2008)Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms., , , и . ACIS-ICIS, стр. 587-591. IEEE Computer Society, (2007)