From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarial Attacks on Monocular Depth Estimation., , , , и . CoRR, (2020)Research on the knowledge hierarchy and practice teaching of operating system course under the background of emerging engineering., , , , и . ICCSE, стр. 30-34. IEEE, (2020)PFA: Privacy-preserving Federated Adaptation for Effective Model Personalization., , и . WWW, стр. 923-934. ACM / IW3C2, (2021)Comprehensive Evaluation Method of Multi-meter Integrated Energy Metering Operating State Based on Hierarchical Structure., , , , , и . ICCT, стр. 1665-1669. IEEE, (2020)AgileRabbit: A Feedback-Driven Offloading Middleware for Smartwatch Apps., , , , и . Internetware, стр. 6:1-6:10. ACM, (2017)A HAL for Component-Based Embedded Operating Systems., , и . COMPSAC (2), стр. 23-24. IEEE Computer Society, (2005)0-7695-2413-3.Towards a Software Framework for Building Highly Flexible Component-Based Embedded Operating Systems., , , и . EUC, том 4808 из Lecture Notes in Computer Science, стр. 170-181. Springer, (2007)Jupiter: transparent augmentation of smartphone capabilities through cloud computing., , , , , и . MobiHeld@SOSP, стр. 2:1-2:6. ACM, (2011)Robot Predictive Maintenance Method Based on Program-Position Cycle., , и . ICIRA (1), том 13013 из Lecture Notes in Computer Science, стр. 78-88. Springer, (2021)ReMoS: Reducing Defect Inheritance in Transfer Learning via Relevant Model Slicing., , , , , , , и . ICSE, стр. 1856-1868. ACM, (2022)