From post

Toward Extracting Orientation of Personal Interest for Human Activity Recognition.

, , и . NBiS, том 183 из Lecture Notes on Data Engineering and Communications Technologies, стр. 227-238. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Real-Time Identification of Different TCP Versions., , и . APNOMS, том 4773 из Lecture Notes in Computer Science, стр. 215-224. Springer, (2007)Towards real-time processing for application identification of encrypted traffic., , , , и . ICNC, стр. 136-140. IEEE, (2014)Effective bit selection methods for improving performance of packet classifications on IP routers., , , и . GLOBECOM, стр. 2350-2354. IEEE, (2002)Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic., , , , и . ICMLA (2), стр. 358-361. IEEE Computer Society, (2011)978-0-7695-4607-0.On Inferring Network Impact Factors by Decomposition of Mixed Distribution., , , и . GLOBECOM, IEEE, (2006)Image Processing Approach to Automatic Scoring System for Archery Targets., , , , , и . IIH-MSP, стр. 259-262. IEEE, (2013)An Automatic Error Identification Method in Call Control Protocol Using Levenshtein Distance., , , , и . ICIN, стр. 266-273. IEEE, (2020)A New TCAM Architecture for Managing ACL in Routers., , , , и . IEICE Trans. Commun., 93-B (11): 3004-3012 (2010)Identification of Attack Nodes from Traffic Matrix Estimation., , и . IEICE Trans. Commun., 90-B (10): 2854-2864 (2007)SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet., , , , , , , , и . Comput. Networks, (2014)