From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security policy specification for home network., , , и . Int. J. Ad Hoc Ubiquitous Comput., 4 (6): 372-378 (2009)Early Wildfire Detection Using Convolutional Neural Network., , , и . IW-FCV, том 1212 из Communications in Computer and Information Science, стр. 18-30. Springer, (2020)Security model for video surveillance system., и . ICTC, стр. 100-104. IEEE, (2012)Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing., , , и . PDCAT, том 931 из Communications in Computer and Information Science, стр. 84-89. Springer, (2018)De-identification and restoration methods for protecting privacy in off-line documents., , и . ICTC, стр. 1543-1545. IEEE, (2020)Pado: A Data Processing Engine for Harnessing Transient Resources in Datacenters., , , , , , , и . EuroSys, стр. 575-588. ACM, (2017)Extraction of Meta-Data for Recommendation Using Keyword Mapping., , , и . IEEE Access, (2024)A Secret Key Updating Method between Devices for Secure Smart Services., и . ICTC, стр. 946-948. IEEE, (2018)Efficient pricing of Bermudan options using recombining quadratures., , и . J. Comput. Appl. Math., (2014)Artificial Intelligence-Based Plant Breeding using Genotype and Phenotype Data: Methods and Future Work., , , , , , , и . IEEE Big Data, стр. 3458-3463. IEEE, (2023)