From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Approximate model of fisheye camera based on the optical refraction., , , и . Multimedia Tools Appl., 73 (3): 1445-1457 (2014)Towards the Design and Development of a 3D Virtual Psychological Self-Service Platform for Occupational stress (Research-in-Progress)., и . PACIS, стр. 16. (2014)Low-cost wireless phase calibration that works on COTS RFID systems: poster., , , , , и . MobiCom, стр. 439-440. ACM, (2016)Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing., , , , и . IoTBD, стр. 243-254. SciTePress, (2016)Semantic Video Carving Using Perceptual Hashing and Optical Flow., , , , , , , , и . IFIP Int. Conf. Digital Forensics, том 511 из IFIP Advances in Information and Communication Technology, стр. 223-244. Springer, (2017)Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design., , , , , , , , , и . Quantum Inf. Process., 13 (6): 1425-1435 (2014)Feature selection for high dimensional imbalanced class data based on F-measure optimization., , , , , , и . SPAC, стр. 278-283. IEEE, (2017)Dynamic Attribute-Based Access Control in Cloud Storage Systems., , , , , и . Trustcom/BigDataSE/ISPA, стр. 129-137. IEEE, (2016)Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection., , , , , , , , и . ICA3PP (4), том 11337 из Lecture Notes in Computer Science, стр. 374-388. Springer, (2018)Using Risk Dominance Strategy in Poker., , , , и . J. Inf. Hiding Multim. Signal Process., 5 (3): 555-566 (2014)