From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A robust watermarking technique based on the polarity relationship between blocks., , и . ICNSC, стр. 340-343. IEEE, (2015)Analysis of Multi-path Random Key Pre-distribution for Wireless Sensor Networks., , , , и . IMIS, стр. 497-502. IEEE Computer Society, (2011)Using Code Division Technique to Improve the Performance of Ad Hoc Wireless Network., , и . ACIS-ICIS, стр. 634-639. IEEE Computer Society, (2005)Probabilistic packet marking with non-preemptive compensation., , и . IEEE Communications Letters, 8 (6): 359-361 (2004)Mining Regression Rules and Regression Trees., , и . PAKDD, том 1394 из Lecture Notes in Computer Science, стр. 271-282. Springer, (1998)Secure Access Control Method for Wireless Sensor Networks., , , , и . IJDSN, (2015)A Fast Algorithm of Cubic Convolution Spline Interpolation for Image Compression., и . IMSA, стр. 1-5. IASTED/ACTA Press, (1999)Error Rate-Based Dynamic Weighted Fair Queuing In Wireless Networks., , , и . LCN, стр. 546-553. IEEE Computer Society, (2005)An Image Authentication and Recovery Method Using Optimal Selection of Block Types., , и . ISM, стр. 151-154. IEEE Computer Society, (2014)A PTC Scheme for Internet of Things: Private-Trust-Confidentiality., , , и . AINA Workshops, стр. 969-974. IEEE Computer Society, (2016)