From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reusing the permutation matrix dynamically for efficient image cryptographic algorithm., , , , и . Signal Process., (2015)Hot Topic Detection Based on a Refined TF-IDF Algorithm., , , , и . IEEE Access, (2019)Compressed sensing-based time-domain channel estimator for full-duplex OFDM systems with IQ-imbalances., , , , , , , , и . Sci. China Inf. Sci., 60 (8): 82303 (2017)Approximate Euclidean shortest paths amid convex obstacles., , и . SODA, стр. 283-292. SIAM, (2009)Discrete blind reconstruction method for multi-coset sampling., , и . IET Signal Process., 10 (5): 465-470 (2016)Empirical Investigation of EachNet: The eBay Model of C2C Online Auction in China., , , и . IEEE Trans. Engineering Management, 59 (1): 160-175 (2012)LTAM: A Location-Temporal Authorization Model., и . Secure Data Management, том 3178 из Lecture Notes in Computer Science, стр. 172-186. Springer, (2004)Practical methods for shape fitting and kinetic data structures using core sets., , , и . SCG, стр. 263-272. ACM, (2004)A 2D kinetic triangulation with near-quadratic topological changes., , и . SCG, стр. 180-189. ACM, (2004)Record high-Q optical bandpass filter based on the EIT-like effect between two microrings., , , , , , , , , и 1 other автор(ы). OFC, стр. 1-3. IEEE, (2016)