From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introduction to the Special Issue on a More Convenient and Secure Electronic Commerce.. J. Organ. Comput. Electron. Commer., 10 (4): 225-226 (2000)Design and characterization of Si/SiGe heterostructure sub-100 nm bulk p-MOSFET.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2009)ndltd.org (oai:dspace.mit.edu:1721.1/53289).The SPI Synchronization Method for Data Efficiency and Integrity between MCUs., , , и . ICACT, стр. 314-319. IEEE, (2019)The flow-reduced malware detection system by controlling inactive/active timeout., , , , и . ICACT, стр. 369-372. IEEE, (2018)Extraction of Structured Rules from Web Pages and Maintenance of Mutual Consistency: XRML Approach., и . RuleML, том 2876 из Lecture Notes in Computer Science, стр. 150-163. Springer, (2003)Case-based modification for optimization agents: AGENT-OPT., и . Decis. Support Syst., 36 (4): 355-370 (2004)Time-bound negotiation framework for electronic commerce agents., , и . Decis. Support Syst., 28 (4): 319-331 (2000)Introduction of Vol. 3, No. 2, , и . Electron. Commer. Res. Appl., 3 (2): 107 (2004)Android programming techniques for improving performance., и . iCAST, стр. 386-389. IEEE, (2011)Enhancing Deepfake Detection: Spatial-Temporal Preprocessing and Self-Attention ResI3D Model., , , и . AICCC, стр. 27-35. ACM, (2023)