From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tree Computation for Reserved Bandwidth Traffic., и . J. High Speed Networks, 3 (4): 513-533 (1994)Self-Generating Policies for Machine Learning in Coalition Environments., , , , , , , , , и . PADG@ESORICS, том 11550 из Lecture Notes in Computer Science, стр. 42-65. Springer, (2018)Authentication for Distributed Web Caches., , , и . ESORICS, том 2502 из Lecture Notes in Computer Science, стр. 126-145. Springer, (2002)Federated AI for the Enterprise: A Web Services Based Implementation., , и . ICWS, стр. 20-27. IEEE, (2019)Application of Halftoning Algorithms to Location Dependent Sensor Placement., , , , , и . ISCAS, стр. 161-164. IEEE, (2009)A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment., , , и . CoRR, (2019)A Security-Constrained Reinforcement Learning Framework for Software Defined Networks., , , и . ICC, стр. 1-6. IEEE, (2021)A Policy-based Approach for Measuring Data Quality., , , , и . IEEE BigData, стр. 4025-4031. IEEE, (2019)Audio Analysis as a Control Knob for Social Sensing., , , , и . SocialSens@CPSWeek, стр. 75-80. ACM, (2017)IPSECvalidate: A Tool to Validate IPSEC Configurations., , , , и . LISA, стр. 19-24. USENIX, (2001)