From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of an Identity-Based Signature From Factorization Problem., , , и . IEEE Access, (2020)Using Control Theory to Guide Load Shedding in Medical Data Stream Management System., , , , , , , и . ASIAN, том 3818 из Lecture Notes in Computer Science, стр. 236-248. Springer, (2005)A Three-Dimensional Ultrasonic Pen-Type Input Device With Millimeter-Level Accuracy for Human-Computer Interaction., , , и . IEEE Access, (2020)Library resources semantization based on resource ontology., , и . Electron. Libr., 32 (3): 341-362 (2014)A Trace-restricted Kronecker-Factored Approximation to Natural Gradient., , , , , , и . CoRR, (2020)A Composite Internal Model Robust Control Strategy for an Automobile Steer-by-wire System., , и . IECON, стр. 29-34. IEEE, (2020)A Multi-Vehicle Longitudinal Trajectory Collision Avoidance Strategy Using AEBS With Vehicle-Infrastructure Communication., , , , , , , , и . IEEE Trans. Veh. Technol., 71 (2): 1253-1266 (2022)The acquisition method of the user's Kansei needs based on double matrix recommendation algorithm., , , и . J. Intell. Fuzzy Syst., 41 (2): 3809-3820 (2021)Toward In-Band Self-Organization in Energy-Efficient MAC Protocols for Sensor Networks., , и . IEEE Trans. Mob. Comput., 7 (2): 156-170 (2008)Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement., , , , и . IEEE Access, (2019)