From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 323-328. IEEE Computer Society, (2018)Bayesian Ying-Yang Learning on Orthogonal Binary Factor Analysis., и . ICANN (1), том 5163 из Lecture Notes in Computer Science, стр. 255-264. Springer, (2008)Intrinsic Universal Measurements of Non-linear Embeddings.. CoRR, (2018)Information Geometry and Minimum Description Length Networks., , , и . ICML, том 37 из JMLR Workshop and Conference Proceedings, стр. 49-58. JMLR.org, (2015)Experimental Quantum-enhanced Cryptographic Remote Control., , , , , и . CoRR, (2019)Multi-rate System Design Through Integrating Synchronous Components.. ICTAC, том 9399 из Lecture Notes in Computer Science, стр. 464-482. Springer, (2015)Stochastic 2-D Motion Planning with a POMDP Framework., и . CoRR, (2018)Applications of colloidal quantum dots., , , , , , , , , и . Microelectron. J., 40 (3): 644-649 (2009)Registration-based compensation using sparse representation in conformal-array STAP., , , и . Signal Process., 91 (10): 2268-2276 (2011)Mining Weighted Association Rules without Preassigned Weights., и . IEEE Trans. Knowl. Data Eng., 20 (4): 489-495 (2008)