From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Performance Evaluation of Preference Evaluation Techniques in Real High Dimensional Database., , , , и . ANT/MobiWIS, том 10 из Procedia Computer Science, стр. 894-901. Elsevier, (2012)Active warden as the main hindrance for steganography information retrieval., , , , и . CAMP, стр. 277-280. IEEE, (2012)Efficient Skyline Processing Algorithm over Dynamic and Incomplete Database., , , , и . iiWAS, стр. 190-199. ACM, (2018)A Hybrid Scheme for Face Template Protection., , , и . IMCOM, стр. 6:1-6:7. ACM, (2016)Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation., , , и . FNC/MobiSPC, том 56 из Procedia Computer Science, стр. 370-375. Elsevier, (2015)Towards secure model for SCADA systems., , , , и . CyberSec, стр. 60-64. IEEE, (2012)Artificial Immune Recognition System with Nonlinear Resource Allocation Method and Application to Traditional Malay Music Genre Classification., , , , и . ICARIS, том 5132 из Lecture Notes in Computer Science, стр. 132-141. Springer, (2008)Using process mining to business process distribution., , , и . SAC, стр. 2140-2145. ACM, (2009)Effective mining on large databases for intrusion detection., , , , и . ISBAST, стр. 204-207. IEEE, (2014)Windows Web Proxy Caching simulation: a Tool for simulating Web Proxy Caching under Windows Operating Systems., , , и . J. Comput. Sci., 10 (8): 1380-1388 (2014)