From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security., , , , , , , , и . WCNC, стр. 49-54. IEEE, (2022)Quantitative and qualitative comparison of three laser-range mapping algorithms using two types of laser scanner data., , и . SMC, стр. 1422-1427. IEEE, (2000)An Efficient Searching Algorithm for Approximate Nearest Neighbor Queries in High Dimensions., , и . ICMCS, Vol. 1, стр. 865-869. IEEE Computer Society, (1999)Conceptual Data Modeling with Constraints in Maude.. CALCO, том 4624 из Lecture Notes in Computer Science, стр. 96-110. Springer, (2007)CINDAM: Customized Information Networks for Deception and Attack Mitigation., , , , , и . SASO Workshops, стр. 114-119. IEEE Computer Society, (2015)Multiple Functional Brain Networks Related to Pain Perception Revealed by fMRI., , , , , , и . Neuroinformatics, 20 (1): 155-172 (2022)On quantification of anchor placement., , и . INFOCOM, стр. 2192-2200. IEEE, (2012)Machine Learning and Its Application at Nooksack Falls Hydroelectric Station., и . AAAI, стр. 1584-1585. AAAI Press / The MIT Press, (2005)Clique covers of H-free graphs., , , и . Eur. J. Comb., (2024)Self Adaptive Robust Resource Allocation for Prioritized TCP Flows in Wireless Networks., , , , и . SASO Workshops, стр. 108-113. IEEE Computer Society, (2015)