From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reliable detection of episodes in event sequences., , и . Knowl. Inf. Syst., 7 (4): 415-437 (2005)Pattern Matching Image Compression: Algorithmic and Empirical Results., , и . IEEE Trans. Pattern Anal. Mach. Intell., 21 (7): 614-627 (1999)A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming., , , , и . IEEE Trans. Knowl. Data Eng., 17 (7): 1010-1014 (2005)Secure two-party input-size reduction: Challenges, solutions and applications., , и . Inf. Sci., (2021)New Clique and Independent Set Algorithms for Circle Graphs (Discrete Applied Mathematics 36 (1992) 1-24)., , и . Discret. Appl. Math., 41 (2): 179-180 (1993)New clique and independent set algorithms for circle graphs., , и . Discret. Appl. Math., 36 (1): 1-24 (1992)Fast Detection and Display of Symmetry in Outerplanar Graphs., и . Discret. Appl. Math., 39 (1): 13-35 (1992)Output-Sensitive Methods for Rectilinear Hidden Surface Removal, , и . Inf. Comput., 107 (1): 1-24 (ноября 1993)On the Complexity of Authorization in RBAC under Qualification and Security Constraints., , , , и . IEEE Trans. Dependable Secur. Comput., 8 (6): 883-897 (2011)Securely outsourcing linear algebra computations., и . AsiaCCS, стр. 48-59. ACM, (2010)