From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Provably secure three-party authenticated key agreement protocol using smart cards., , , , , и . Comput. Networks, (2014)Revisiting the Design of Mega Data Centers: Considering Heterogeneity Among Containers., , , и . IEEE/ACM Trans. Netw., 22 (5): 1503-1515 (2014)FOGG: A Fog Computing Based Gateway to Integrate Sensor Networks to Internet., , и . SOFT5@ITC, стр. 42-47. IEEE, (2017)978-0-9883045-3-6.Evaluation of Human Altruism Using a DTN-based Mobile Social Network Application., , , и . GI-Jahrestagung, том P-208 из LNI, стр. 81-95. GI, (2012)A Data-Driven Analysis of K-12 Students' Participation and Learning Performance on an Online Supplementary Learning Platform., , , , , , и . ICCCN, стр. 1-9. IEEE, (2021)SRUF: Low-Latency Path Routing with SRv6 Underlay Federation in Wide Area Network., , , , , и . ICDCS, стр. 910-920. IEEE, (2021)Understanding Housing Market Behaviour from a Microscopic Perspective., , , , и . ICCCN, стр. 1-9. IEEE, (2018)Cooperative Connected Autonomous Vehicles (CAV): Research, Applications and Challenges., , , , , , , , , и 2 other автор(ы). ICNP, стр. 1-6. IEEE, (2019)NCShield: Securing decentralized, matrix factorization-based network coordinate systems., , , и . IWQoS, стр. 1-9. IEEE, (2012)Signaling in IP-Based Networks: Retrospect and Prospect.. IEEE Internet Comput., 20 (3): 80-88 (2016)