From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building topology-aware overlays using global soft-state, , и . Distributed Computing Systems, 2003. Proceedings. 23rd International Conference on, стр. 500- 508. (2003)Enabling High-Dimensional Hierarchical Uncertainty Quantification by ANOVA and Tensor-Train Decomposition., , , , и . CoRR, (2014)A Big-Data Approach to Handle Many Process Variations: Tensor Recovery and Applications., , и . CoRR, (2016)Tensor Computation: A New Framework for High-Dimensional Problems in EDA., , , , и . CoRR, (2016)iSPY: Detecting IP Prefix Hijacking on My Own., , , , и . IEEE/ACM Trans. Netw., 18 (6): 1815-1828 (2010)Progressive multiple alignment with constraints., , , и . RECOMB, стр. 220-225. ACM, (1997)Winnowing sequences from a database search., , , , и . RECOMB, стр. 50-58. ACM, (1999)Robust Sharpness Metrics Using Reorganized DCT Coefficients for Auto-Focus Application., , , и . ACCV (4), том 9006 из Lecture Notes in Computer Science, стр. 172-187. Springer, (2014)An Improved PSO Algorithm for Battery Parameters Identification Optimization Based on Thevenin Battery Model., , , , и . CCIS, стр. 295-298. IEEE, (2018)A Simple Key Reuse Attack on Ntru Cryptosystem., , , , и . IACR Cryptology ePrint Archive, (2019)