From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bounded model checking of C++ programs based on the Qt cross-platform framework., , , и . Softw. Test. Verification Reliab., (2017)ESBMCQtOM: A Bounded Model Checking Tool to Verify Qt Applications., , , и . SPIN, том 9641 из Lecture Notes in Computer Science, стр. 97-103. Springer, (2016)A Common but Flexible Method for IoT Device Forensics., , , , и . GLOBECOM, стр. 1-7. IEEE, (2021)An Innovative Tool to Create Neurofeedback Games for ADHD Treatment., , , , , и . IWINAC (1), том 10337 из Lecture Notes in Computer Science, стр. 183-192. Springer, (2017)Signature-based Network Intrusion Detection System using JESS (SNIDJ)., и . EuroIMSA, стр. 281-286. IASTED/ACTA Press, (2005)Hierarchical stack filtering: a bitplane-based algorithm for massively parallel processors., , , и . J. Real Time Image Process., 16 (5): 1717-1730 (2019)Smart Computer-Assisted Cognitive Rehabilitation for Visually Impaired People., , , , , и . ISAmI, том 615 из Advances in Intelligent Systems and Computing, стр. 121-130. Springer, (2017)Programming a microcontroller for data capture and display., , , и . SEDE, стр. 276-281. ISCA, (2007)The Factory Physics for the Scheduling: Application to Footwear Industry., , , , и . SIMULTECH, стр. 248-254. SciTePress, (2017)Synchronous Key Generation from Chaotic Systems., , , и . Security and Management, стр. 437-442. CSREA Press, (2008)