From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels, и . CoRR, (2013)Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones., , , , , и . CoRR, (2018)Simulation and inversion of electrical conductivity distribution using the finite functions method., , , , и . FSKD, стр. 2746-2749. IEEE, (2012)Research on Embedded-Based Wireless Authentication System., , , и . ICICA (1), том 307 из Communications in Computer and Information Science, стр. 469-475. Springer, (2012)Leveraging a Graph-Powered, Real-Time Recommendation Engine to Create Rapid Business Value., , , и . RecSys, стр. 385-386. ACM, (2016)Temporally Invariant Junction Tree for Interference in Dynamic Bayesian Network.. Artificial Intelligence Today, том 1600 из Lecture Notes in Computer Science, Springer, (1999)A Bayesian Treatment for Singular Value Decomposition., , , и . HPCC/CSS/ICESS, стр. 1761-1767. IEEE, (2015)Fault tolerant scheduling with dynamic number of replicas in heterogeneous system., , , и . HPCC, стр. 434-441. IEEE, (2010)Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs., , и . WADS, том 5664 из Lecture Notes in Computer Science, стр. 566-577. Springer, (2009)How to Use Spanning Trees to Navigate in Graphs., и . MFCS, том 5734 из Lecture Notes in Computer Science, стр. 282-294. Springer, (2009)