From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Dynamic malicious node detection with semi-supervised multivariate classification in cognitive wireless sensor networks., , и . Concurr. Comput. Pract. Exp., 27 (12): 2910-2923 (2015)A Highly Parallelized PIM-Based Accelerator for Transaction-Based Blockchain in IoT Environment., , , , , , и . IEEE Internet Things J., 7 (5): 4072-4083 (2020)Understanding Characteristics and System Implications of DAG-Based Blockchain in IoT Environments., , , , и . IEEE Internet Things J., 9 (16): 14478-14489 (2022)Trust prediction and trust-based source routing in mobile ad hoc networks., , , , и . Ad Hoc Networks, 11 (7): 2096-2114 (2013)Leveraging the Interplay of RAID and SSD for Lifetime Optimization of Flash-Based SSD RAID., , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (7): 1395-1408 (2021)A Survey of Blockchain Data Management Systems., , , , , и . CoRR, (2021)Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory., , , и . IET Wirel. Sens. Syst., 1 (4): 248-266 (2011)PQ-PIM: A pruning-quantization joint optimization framework for ReRAM-based processing-in-memory DNN accelerator., , , , , и . J. Syst. Archit., (2022)Branch Predictor Design for Energy Harvesting Powered Nonvolatile Processors., , , , , , и . IEEE Trans. Computers, 73 (3): 722-734 (марта 2024)Make a Strategic Decision Using Markov for Dynamic Checkpoint Interval., , , и . CIT (1), стр. 197-202. IEEE Computer Society, (2009)