Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random Subset Optimization., and . ECAI, volume 141 of Frontiers in Artificial Intelligence and Applications, page 88-92. IOS Press, (2006)Certifying an embedded remote method invocation protocol., and . SAC, page 352-359. ACM, (2008)Car-to-Pedestrian communication with MEC-support for adaptive safety of Vulnerable Road Users, , , and . Computer Communications, (January 2020)Unified global optimality conditions for smooth minimization problems with mixed variables., , and . RAIRO Oper. Res., 42 (3): 361-370 (2008)Adaptive Safety Context Information for Vulnerable Road Users with MEC Support., , , and . WONS, page 28-35. IEEE / IFIP, (2019)A More Efficient System for Peer-to-Peer Botnet Detection., , and . ICIIT, page 62-70. ACM, (2023)Disease subtyping using community detection from consensus networks., , , , , and . KSE, page 318-323. IEEE, (2020)Incoherent Sentence Detection in Scientific Articles in Russian and English., and . FRUCT, page 267-273. IEEE, (2021)Multi-level detector for pornographic content using CNN models., , , , , and . RIVF, page 1-5. IEEE, (2020)Additional Learning on Object Detection: A Novel Approach in Pornography Classification., , , , , and . FDSE (CCIS Volume), volume 1306 of Communications in Computer and Information Science, page 311-324. Springer, (2020)