From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Firewall Queries., , , и . OPODIS, том 3544 из Lecture Notes in Computer Science, стр. 197-212. Springer, (2004)A secure cookie protocol., , , и . ICCCN, стр. 333-338. IEEE, (2005)Formal Specification and Verification of a Micropayment Protocol., и . ICCCN, стр. 489-494. IEEE, (2004)Noise Tolerant Localization for Sensor Networks., , , , , , и . IEEE/ACM Trans. Netw., 26 (4): 1701-1714 (2018)Multi-Category RFID Estimation., , , , , , и . IEEE/ACM Trans. Netw., 25 (1): 264-277 (2017)A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic., , , и . IEEE/ACM Trans. Netw., 31 (3): 1071-1086 (июня 2023)DeepScaling: microservices autoscaling for stable CPU utilization in large scale cloud systems., , , , , , , , и . SoCC, стр. 16-30. ACM, (2022)A first look at cellular network performance during crowded events., , , , , и . SIGMETRICS, стр. 17-28. ACM, (2013)Regularized Graph Structure Learning with Semantic Knowledge for Multi-variates Time-Series Forecasting., , , , , , и . IJCAI, стр. 2362-2368. ijcai.org, (2022)A template approach to group key establishment in dynamic ad-hoc groups., , , и . ICNP, стр. 1-2. IEEE Computer Society, (2016)