From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Implication Problem of Computing Policies., , , , и . SSS, том 9212 из Lecture Notes in Computer Science, стр. 109-123. Springer, (2015)Indeterminate string inference algorithms., , и . J. Discrete Algorithms, (2012)Gene Tree Parsimony in the Presence of Gene Duplication, Loss, and Incomplete Lineage Sorting., , , , , , и . RECOMB-CG, том 14616 из Lecture Notes in Computer Science, стр. 110-128. Springer, (2024)QT-GILD: Quartet Based Gene Tree Imputation Using Deep Learning Improves Phylogenomic Analyses Despite Missing Data., , , , , и . RECOMB, том 13278 из Lecture Notes in Computer Science, стр. 159-176. Springer, (2022)Two-phase Nonrepudiation Protocols., , и . ICCCNT, стр. 22:1-22:8. ACM, (2016)DEFT: Distributed, Elastic, and Fault-Tolerant State Management of Network Functions., , , и . CNSM, стр. 1-7. IEEE, (2023)Nonrepudiation Protocols Without a Trusted Party., , и . NETYS, том 9944 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2016)Executing Firewalls in Public Clouds., , и . ICCCNT, стр. 1-6. IEEE, (2019)Inferring Strings from Cover Arrays., , , и . Discret. Math. Algorithms Appl., (2013)Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress)., , , и . NCA, стр. 307-309. IEEE, (2022)