From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A dynamic-encryption authentication scheme for M2M security in cyber-physical systems., и . GLOBECOM, стр. 2897-2901. IEEE, (2013)GraphScSh: Efficient I/O Scheduling and Graph Sharing for Concurrent Graph Processing., , , , , и . NPC, том 11783 из Lecture Notes in Computer Science, стр. 3-15. Springer, (2019)A novel comprehensive wave-form MS data processing method., , , , , , и . Bioinform., 25 (6): 808-814 (2009)Advances on Exploiting Polarization in Wireless Communications: Channels, Technologies, and Applications., , , , и . IEEE Commun. Surv. Tutorials, 19 (1): 125-166 (2017)Track fusion in the presence of sensor biases., и . IET Signal Process., 8 (9): 958-967 (2014)A Non-Invasive Continuous Blood Pressure Estimation Approach Based on Machine Learning., , , и . Sensors, 19 (11): 2585 (2019)An Adaptive Framework for Multi-Vehicle Ground Speed Estimation in Airborne Videos., , , , , и . Remote Sensing, 11 (10): 1241 (2019)Various Discriminatory Features for Eye Detection., и . Cross Disciplinary Biometric Systems, том 37 из Intelligent Systems Reference Library, Springer, (2012)GANSynth: Adversarial Neural Audio Synthesis., , , , , и . ICLR (Poster), OpenReview.net, (2019)An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism., , и . ACM Conference on Computer and Communications Security, стр. 2-11. ACM, (2007)