From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Wireless fire monitoring system for ancient buildings., , , , , , и . Infoscale, том 304 из ACM International Conference Proceeding Series, стр. 42. ACM, (2007)Automated Vulnerability Management through Web Services., , , и . GCC (1), том 3032 из Lecture Notes in Computer Science, стр. 1067-1070. Springer, (2003)Common Vulnerability Markup Language., , , и . ACNS, том 2846 из Lecture Notes in Computer Science, стр. 228-240. Springer, (2003)A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography., , , и . CCIS, стр. 487-490. IEEE, (2014)A Threshold Multi-secret Sharing Scheme., , , и . ICNSC, стр. 1705-1707. IEEE, (2008)Practical indoor tracking using Wireless Sensor Networks., , , , и . WPNC, стр. 209-215. IEEE, (2009)On the effect of flow table size and controller capacity on SDN network throughput., , , , и . ICC, стр. 1-6. IEEE, (2017)A decision-tree-based on-line flow table compressing method in Software Defined Networks., , , и . IWQoS, стр. 1-2. IEEE, (2016)Deadline-sensitive opportunistic utility-based routing in cyclic mobile social networks., , , , и . SECON, стр. 301-309. IEEE, (2015)Personalized Privacy-Preserving Data Aggregation for Histogram Estimation., , , , , и . GLOBECOM, стр. 1-6. IEEE, (2015)