From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Impact of Deep Learning on Organizational Agility., , и . ICIS, Association for Information Systems, (2019)A New Scheme for TCP Congestion Control: Smooth-Start and Dynamic Recovery., и . MASCOTS, стр. 69-76. IEEE Computer Society, (1998)Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks., , и . BROADNETS, IEEE, (2006)Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending., , , , и . IEEE Trans. Inf. Forensics Secur., 12 (1): 144-156 (2017)On Energy Security of Smartphones., , , и . CODASPY, стр. 148-150. ACM, (2016)Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear., , и . CODASPY, стр. 345-356. ACM, (2014)DNSonChain: Delegating Privacy-Preserved DNS Resolution to Blockchain., , , , и . ICNP, стр. 1-11. IEEE, (2021)Layer-4 Service Differentiation and Resource Isolation., и . IEEE Real Time Technology and Applications Symposium, стр. 67-78. IEEE Computer Society, (2002)Characterizing industrial control system devices on the Internet., , , и . ICNP, стр. 1-10. IEEE Computer Society, (2016)ASCEND: A search engine for online industrial control devices., , , и . ICNP, стр. 1-2. IEEE Computer Society, (2016)