From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 323-328. IEEE Computer Society, (2018)Multi-rate System Design Through Integrating Synchronous Components.. ICTAC, том 9399 из Lecture Notes in Computer Science, стр. 464-482. Springer, (2015)Stochastic 2-D Motion Planning with a POMDP Framework., и . CoRR, (2018)Micro-innovative Design of Internet Products from the Perspective of User Stickiness - Illustrated by the Case of 360 Applets., и . HCI (38), том 1224 из Communications in Computer and Information Science, стр. 94-99. Springer, (2020)Trajectory optimization on manifolds with applications to quadrotor systems., , , , и . Int. J. Robotics Res., (2020)A Practical Chinese Dependency Parser Based on A Large-scale Dataset., , , и . CoRR, (2020)Experimental Quantum-enhanced Cryptographic Remote Control., , , , , и . CoRR, (2019)Intrinsic Universal Measurements of Non-linear Embeddings.. CoRR, (2018)Information Geometry and Minimum Description Length Networks., , , и . ICML, том 37 из JMLR Workshop and Conference Proceedings, стр. 49-58. JMLR.org, (2015)Bayesian Ying-Yang Learning on Orthogonal Binary Factor Analysis., и . ICANN (1), том 5163 из Lecture Notes in Computer Science, стр. 255-264. Springer, (2008)