From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Spying on Instant Messaging Servers: Potential Privacy Leaks through Metadata., , , и . Trans. Data Priv., 12 (2): 175-206 (2019)GeNePi: A Multi-Objective Machine Reassignment Algorithm for Data Centres., , , и . Hybrid Metaheuristics, том 8457 из Lecture Notes in Computer Science, стр. 115-129. Springer, (2014)Hypertext document generator in a computer supported cooperative work environment., , , , , и . ACM Southeast Regional Conference, стр. 205-207. ACM, (1997)Supporting document organization and security in distributed collaborative authoring systems through the use of collaborations., , , , , и . ACM Southeast Regional Conference, стр. 208-210. ACM, (1997)Computer-aided software engineering in a computer supported cooperative environment., , , , , и . ACM Southeast Regional Conference, стр. 268-274. ACM, (1997)ImpRes: supporting services in IPv6 using the flow label and hop-by-hop option fields., и . ACM Southeast Regional Conference, стр. 235-242. ACM, (1997)Provisioning call quality and capacity for femtocells over wireless mesh backhaul., , , и . PIMRC, стр. 3071-3076. IEEE, (2013)Dynamic content-based adaptation of streamed multimedia., , и . J. Netw. Comput. Appl., 30 (3): 983-1006 (2007)Coordinating Allocation of Resources for Multiple Virtual IPTV Providers to Maximize Revenue., , , , , , и . TBC, 57 (4): 826-839 (2011)An Approach to Mitigate Black Hole Attacks on Vehicular Wireless Networks., , и . VTC Spring, стр. 1-7. IEEE, (2017)