From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Low Voltage Network Clustering for High Renewable Penetration Studies-An Isolated Network Case Study., , , , , , , , и . ISGT-Europe, стр. 1181-1185. IEEE, (2020)Modality Differences in Timing: Testing the Pacemaker Speed Explanation., , и . CogSci, cognitivesciencesociety.org, (2017)Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism., , , и . PPREW@ACSAC, стр. 6:1-6:11. ACM, (2015)PizzaBox: studying physical object manipulation based fast food ordering., и . UbiComp/ISWC Adjunct, стр. 38-41. ACM, (2020)Heuristic malware detection via basic block comparison., , , и . MALWARE, стр. 11-18. IEEE Computer Society, (2013)CARDINAL: similarity analysis to defeat malware compiler variations., , и . MALWARE, стр. 39-46. IEEE Computer Society, (2016)ByteWise: A case study in neural network obfuscation identification., , , и . CCWC, стр. 155-164. IEEE, (2018)Impact of age, sleep pressure and circadian phase on time-of-day estimates, , , , , и . Behavioural Brain Research, 201 (1): 48--52 (июля 2009)A Universal Approximation Theorem for Mixture-of-Experts Models., , и . Neural Comput., 28 (12): 2585-2593 (2016)