From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Capturing Cognitive Fingerprints from Keystroke Dynamics., , , , , , , , , и . IT Prof., 15 (4): 24-28 (2013)Enhanced high-performance distributed coordination function for IEEE 802.11 multi-rate LANs., , , и . Int. J. Commun. Syst., 22 (8): 1045-1061 (2009)QoS-Aware Energy-Efficient Association and Resource Scheduling for HetNets., и . IEEE Trans. Veh. Technol., 67 (1): 650-664 (2018)Locally Differentially Private Distributed Deep Learning via Knowledge Distillation., , и . CoRR, (2022)Fair Demand Response With Electric Vehicles for the Cloud Based Energy Management Service., и . IEEE Trans. Smart Grid, 9 (1): 458-468 (2018)A Performance Analysis of the Active Memory System., , и . ICCD, стр. 493-496. IEEE Computer Society, (2001)Spectrum-Energy Efficiency Optimization for Downlink LTE-A for Heterogeneous Networks., и . IEEE Trans. Mob. Comput., 16 (5): 1449-1461 (2017)Enhanced PeerHunter: Detecting Peer-to-peer Botnets through Network-Flow Level Community Behavior Analysis., и . CoRR, (2018)Java Bytecode Optimization with Advanced Instruction Folding Mechanism., и . ISHPC, том 1940 из Lecture Notes in Computer Science, стр. 268-275. Springer, (2000)APN model construction for malicious email detection., , , и . Expert Syst. Appl., 42 (13): 5696-5704 (2015)