From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Design Methodology for Very Large Array Processors - Part 2: Pacube VLSI Arrays., , , , , , и . Int. J. Pattern Recognit. Artif. Intell., 9 (2): 263-301 (1995)New attacks on ISO key establishment protocols., и . IACR Cryptology ePrint Archive, (2008)Research Paper: Using Citation Data to Improve Retrieval from MEDLINE., , , , , и . JAMIA, 13 (1): 96-105 (2006)Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test., , и . J. Supercomput., 79 (9): 10353-10385 (июня 2023)Connectionist predicate logic model with parallel execution of rule chains., и . ICWET, стр. 674-677. ACM, (2010)Attribute reduction on real-valued data in rough set theory using hybrid artificial bee colony: extended FTSBPSD algorithm., и . Soft Comput., 21 (24): 7543-7569 (2017)Using citation data to improve retrieval from MEDLINE, , , , , и . Journal of the American Medical Informatics Association : JAMIA, 13 (1): 96-105 (января 2006)LR: 20061115; PUBM: Print-Electronic; GR: 5 K22 LM008306/LM/NLM; DEP: 20051012; JID: 9430800; 2005/10/12 aheadofprint; 2005/10/14 aheadofprint; ppublish.Medal, A Compendium of Medical Algorithms for Access Over the Internet., и . AMIA, AMIA, (1999)Modelling protein functional domains in signal transduction using Maude.. Briefings Bioinform., 4 (3): 236-245 (2003)Explainable AI for Intrusion Detection Systems., , , и . IC3I, стр. 1563-1567. IEEE, (2022)