From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Localization and Location Verification in Sensor Networks., , , и . MSN, том 3794 из Lecture Notes in Computer Science, стр. 278-287. Springer, (2005)Error Detection Process - Model, Design, and Its Impact on Computer Performance., и . IEEE Trans. Computers, 33 (6): 529-540 (1984)Design of HM2p - A Hierarchical Multimicroprocessor for General Purpose Applications., , и . IEEE Trans. Computers, 31 (11): 1045-1053 (1982)A Non-Blocking Algorithm for Shared Queues Using Compare-and-Swap., , и . ICPP (2), стр. 68-75. CRC Press, (1991)Consecutive Requests Traffic Model in Multistage Interconnection Networks., , и . ICPP (1), стр. 534-541. CRC Press, (1991)Periodic and Aperiodic Task Scheduling in Strongly Partitioned Integrated Real-time Systems., и . Comput. J., 45 (4): 395-409 (2002)The performance of a watchdog protocol for wireless network security., , и . Int. J. Wirel. Mob. Comput., 2 (1): 28-36 (2007)SPDA: A Security Protocol for Data Aggregation in Large-Scale Wireless Sensor Networks., , и . EUC, том 4096 из Lecture Notes in Computer Science, стр. 121-130. Springer, (2006)Emerging COTS architecture support for real-time TSN ethernet., , , и . SAC, стр. 258-265. ACM, (2019)Optimization Criteria for Checkpoint Placement., , и . Commun. ACM, 27 (10): 1008-1012 (1984)