From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Review of "Switching to VoIP by Ted Wallingford, " O'Reilly & Associates, 2005, ISBN 0596008686.. ACM Queue, 4 (1): 62 (2006)Review of "Embedded Linux Primer: A Practical Real-world Approach by Christopher Hallinan, " Prentice Hall PTR, 2006, ISBN: 0131679848.. ACM Queue, 5 (3): 44 (2007)ROSploit: Cybersecurity Tool for ROS., , и . IRC, стр. 415-416. IEEE, (2019)And/Or Trees for Knowledge Representation., и . ECSQARU, том 946 из Lecture Notes in Computer Science, стр. 405-411. Springer, (1995)VecHGrad for solving accurately complex tensor decomposition., , , и . CoRR, (2019)Recurrent Dynamical Projection for Time Series-Based Fraud Detection., и . ICANN (2), том 10614 из Lecture Notes in Computer Science, стр. 503-511. Springer, (2017)Editorial., , , , , и . J. Inf. Secur. Appl., 18 (1): 1 (2013)Assessing the security of VoIP Services., , , и . Integrated Network Management, стр. 373-382. IEEE, (2007)Policy based management of wireless networks., и . Net-Con, том 235 из IFIP Conference Proceedings, стр. 15-26. Kluwer, (2002)Real-time communications: topics for research and methods of collaboration., , и . Comput. Commun. Rev., 44 (3): 112-115 (2014)