From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Immune-Based Model for Service Survivability., , , , , и . CANS, том 4301 из Lecture Notes in Computer Science, стр. 354-363. Springer, (2006)Incentive-driven attacker for corrupting two-party protocols., , , , и . Soft Comput., 22 (23): 7733-7740 (2018)Safety protection based on electromagnetic navigation in robot-assisted vascular interventional surgery., , , и . CISP-BMEI, стр. 1-5. IEEE, (2017)SESS: A security-enhanced secret storage scheme for password managers., , , и . WCSP, стр. 1-5. IEEE, (2015)One memory access bloom filters and their generalization., , и . INFOCOM, стр. 1745-1753. IEEE, (2011)IC security evaluation against fault injection attack based on FPGA emulation., , , и . FPT, стр. 285-288. IEEE, (2016)Exploring the diversity in cluster ensemble generation: Random sampling and random projection., , , и . Expert Syst. Appl., 41 (10): 4844-4866 (2014)Low Resolution 3D Reconstructions of Viruses from X-Ray Crystal Diffraction Data., , , и . ICIP (3), стр. 358-360. IEEE Computer Society, (1998)Multiple Relational Topic Modeling for Noisy Short Texts., , , и . International Journal of Software Engineering and Knowledge Engineering, 28 (11-12): 1559-1574 (2018)Generalized Cluster Aggregation., , и . IJCAI, стр. 1279-1284. (2009)