From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The L-fuzzy vector subspace degrees and its induced convex structure., и . Comput. Appl. Math., 43 (3): 131 (апреля 2024)On potentials of regularized Wasserstein generative adversarial networks for realistic hallucination of tiny faces., , , , , , и . Neurocomputing, (2019)Three-Dimensional Encoding Approach for Wearable Tactile Communication Devices., , , , , и . Sensors, 22 (24): 9568 (2022)Dominance Hierarchies Induce a Population's Full Cooperation., , , и . Dyn. Games Appl., 4 (4): 432-447 (2014)Video Fingerprinting by Using Boosted Features., и . ISNN (3), том 5553 из Lecture Notes in Computer Science, стр. 596-604. Springer, (2009)Efficient Identity-Based Protocol for Fair Certified E-mail Delivery., , и . CANS, том 3810 из Lecture Notes in Computer Science, стр. 200-210. Springer, (2005)Novel techniques for Rayleigh noise suppression and multicast transmission in wavelength division multiplexed passive optical networks.. Chinese University of Hong Kong, Hong Kong, (2011)ndltd.org (oai:cuhk-dr:cuhk_344826).Continuous Time Bayesian Networks for Host Level Network Intrusion Detection., и . ECML/PKDD (2), том 5212 из Lecture Notes in Computer Science, стр. 613-627. Springer, (2008)Image segmentation based on the hybrid total variation model and the K-means clustering strategy., , и . CoRR, (2016)Probabilistic Robust Secure Beamforming in MISO Channels With Imperfect LCSI and Statistical ECSI., , и . IEEE Access, (2017)