From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerability Assessment of Complex Networks Based on Optimal Flow Measurements under Intentional Node and Edge Attacks., , , и . ICT Innovations, стр. 167-176. Springer, (2009)Freehand SPECT reconstructions using look up tables., , , , , и . Medical Imaging: Image-Guided Procedures, том 8316 из SPIE Proceedings, стр. 83162H. SPIE, (2012)