From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mining Regular Patterns in Weighted-Directed Networks., , и . ICIT, стр. 215-220. IEEE, (2014)Hybrid Cloud Support for Large Scale Analytics and Web Processing., , , , и . WebApps, стр. 39-50. USENIX Association, (2012)CDIS: Circle Density Based Iris Segmentation., , , и . IC3, том 40 из Communications in Computer and Information Science, стр. 295-306. Springer, (2009)Text Summarisation Using Laplacian Centrality-Based Minimum Vertex Cover., и . J. Inf. Knowl. Manag., 18 (4): 1950050:1-1950050:20 (2019)Malafide Intension Based Detection of Privacy Violation in Information System., , и . ICISS, том 4332 из Lecture Notes in Computer Science, стр. 365-368. Springer, (2006)CDIA-DS: A framework for efficient reconstruction of compound document image using data structure., , , и . IC3, стр. 1-7. IEEE Computer Society, (2016)Preserving Obliviousness Characteristic of Honeypot database., , , , и . COMAD, стр. 72-79. Tata McGraw-Hill Publishing Company Limited, (2006)TAG: A two-level framework for user authentication through hand gestures., , и . IC3, стр. 503-509. IEEE, (2013)Multi-class instance-incremental framework for classification in fully dynamic graphs., , , и . Int. J. Comput. Sci. Eng., 21 (1): 69-83 (2020)InfoSec-MobCop - Framework for Theft Detection and Data Security on Mobile Computing Devices., , и . IC3, том 40 из Communications in Computer and Information Science, стр. 637-648. Springer, (2009)