From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information., , , и . Int. Trans. Oper. Res., 28 (4): 1864-1889 (2021)Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks., , , и . Comput. Networks, (января 2024)A game-theoretic approach for channel security against active time-varying attacks based on artificial noise., , , и . J. Ambient Intell. Humaniz. Comput., 11 (6): 2215-2224 (2020)Stochastic Computation Offloading and Scheduling Based on Mobile Edge Computing., , , , и . IEEE Access, (2019)Task scheduling using edge computing system in smart city., , и . Int. J. Commun. Syst., (2021)Flexible service selection with user-specific QoS support in service-oriented architecture., , , и . J. Netw. Comput. Appl., 35 (3): 962-973 (2012)Spanning eulerian subgraphs in N2-locally connected claw-free graphs., , , и . Ars Comb., (2010)On Pancyclic Claw-Free Graphs.. Ars Comb., (1998)Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks., , , и . IJDSN, (2012)Lossless Information Hiding in the VQ Index Table., , , и . J. Softw., 8 (3): 547-553 (2013)