From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A spreading activation theory of semantic memory, и . Psychological Review, (1975)Semantic Memory Retrieval: Some Data and a Model.. Formal Aspects of Cognitive Processes, том 22 из Lecture Notes in Computer Science, стр. 41-54. Springer, (1972)Use of Machine Learning in Interactive Cybersecurity and Network Education., и . Sensors, 23 (6): 2977 (марта 2023)The Cybersecurity Packet Control Simulator: CSPCS., , и . GHTC, стр. 226-233. IEEE, (2022)Augmented Reality for Teaching Data Structures in Computer Science., , , , , , и . GHTC, стр. 1-7. IEEE, (2020)A Spreading Activiation Theory on Semantic Processing, и . Psychological Review, (1975)Chief information officer (CIO) panel: how to groom IT leadership as change agents., , , и . CPR, стр. 1-2. ACM, (2012)Secure Outsourced Computation., и . AFRICACRYPT, том 6737 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2011)Resonant Control of Elastic Collisions in an Optically Trapped Fermi Gas of Atoms, , , , и . Phys. Rev. Lett., 88 (17): 173201 (апреля 2002)The death of personal computing at the University of Scranton., и . SIGUCCS, стр. 239-242. ACM, (1991)