From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptographic Security Through a Hardware Root of Trust., , , , , , , , , и 4 other автор(ы). ARC, том 14553 из Lecture Notes in Computer Science, стр. 106-119. Springer, (2024)SMSFormKit: A System for presentation, validation and update of forms for mobile devices., , и . ICETE, стр. 119-124. INSTICC Press, (2005)A Comparative Analysis of Decision Trees Based Classifiers for Road Detection in Urban Environments., , , и . ITSC, стр. 719-724. IEEE, (2015)A Systematic Review of Perception System and Simulators for Autonomous Vehicles Research., , , и . Sensors, 19 (3): 648 (2019)Qualitative analysis of goat and sheep production data using self-organizing maps., , , , , , и . Expert Syst. J. Knowl. Eng., 26 (2): 191-201 (2009)Clustering and line detection in laser range measurements., , , и . Robotics Auton. Syst., 58 (5): 720-726 (2010)GALS SoC interconnect bus for wireless sensor network processor platforms., , и . ACM Great Lakes Symposium on VLSI, стр. 132-137. ACM, (2007)A Novel Keyword Ontology Generator Method Tested on "Digital Transformation in Higher Education" Topic., , , , и . HELMeTO, том 1091 из Communications in Computer and Information Science, стр. 179-191. Springer, (2019)A Deep Analysis of the Existing Datasets for Traffic Light State Recognition., , , и . ITSC, стр. 248-254. IEEE, (2018)Approach of an Active Defense Protocol to Deal with RAT Malware - A Colombian Case Study Against njRAT Campaigns., , , и . WEA (1), том 915 из Communications in Computer and Information Science, стр. 431-445. Springer, (2018)