From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Methods of IPsec Applying Between MN and HA in Mobile IPv6., , и . Security and Management, стр. 475-478. CSREA Press, (2003)Integrating Wireless Sensors and RFID Tags into Energy-Efficient and Dynamic Context Networks., , , и . Comput. J., 52 (2): 240-267 (2009)Detecting plagiarized mobile apps using API birthmarks., , , и . Autom. Softw. Eng., 23 (4): 591-618 (2016)Enabling Transparent Communication with Global ID for the Internet of Things., , , , , , и . IMIS, стр. 695-701. IEEE Computer Society, (2012)Hairspring: Online graph processing middleware for temporal networks., , и . Middleware Posters and Demos, стр. 9-10. ACM, (2016)A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols., , , и . ICDCIT, том 4882 из Lecture Notes in Computer Science, стр. 327-335. Springer, (2007)Automated detection of vulnerable plaque in intravascular ultrasound images., , , , , , , , и . Medical Biol. Eng. Comput., 57 (4): 863-876 (2019)Application of Compact Pneumatic Actuators to Laparoscopic Manipulator., , , , и . MICCAI, том 2208 из Lecture Notes in Computer Science, стр. 1424-1425. Springer, (2001)DAPAS : Denoising Autoencoder to Prevent Adversarial attack in Semantic Segmentation., , , и . IJCNN, стр. 1-8. IEEE, (2020)Uncertainty-Aware Text-to-Program for Question Answering on Structured Electronic Health Records., , , и . CHIL, том 174 из Proceedings of Machine Learning Research, стр. 138-151. PMLR, (2022)