From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Normalized Statistical Metric Space for Hidden Markov Models., , , , , и . IEEE Trans. Cybern., 43 (3): 806-819 (2013)Fusion of threshold rules for target detection in wireless sensor networks., , , , , и . ACM Trans. Sens. Networks, 6 (2): 18:1-18:7 (2010)Mobile Network Analysis Using Probabilistic Connectivity Matrices., , , и . IEEE Trans. Syst. Man Cybern. Part C, 37 (4): 694-702 (2007)On Bandwidth-Limited Sum-of-Games Problems., , , и . IEEE Trans. Syst. Man Cybern. Part A, 41 (2): 341-349 (2011)Inferring Statistically Significant Hidden Markov Models., , , , и . IEEE Trans. Knowl. Data Eng., 25 (7): 1548-1558 (2013)Stochastic Tools for Network Intrusion Detection., и . CoRR, (2017)A Compiler-Based Approach to Data Security., , , и . CC, том 3443 из Lecture Notes in Computer Science, стр. 188-203. Springer, (2005)A brief survey of Cryptocurrency systems., , , , , и . PST, стр. 745-752. IEEE, (2016)Provenance threat modeling., , , , , и . PST, стр. 384-387. IEEE, (2016)Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions., , , , и . MALWARE, стр. 161-166. IEEE, (2018)