From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A hybrid frequency assignment for femtocells and coverage area analysis for co-channel operation., , , и . IEEE Commun. Lett., 12 (12): 880-882 (2008)Formal Specification and Analysis of Timing Properties in Software Systems., , , , и . FASE, том 5503 из Lecture Notes in Computer Science, стр. 262-277. Springer, (2009)A method for distinction of bicycle traffic violations by detection of cyclists' behavior using multi-sensors., , , и . MobiQuitous, стр. 75-83. ACM, (2016)Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification., , , и . COMPSAC, стр. 940-945. IEEE, (2023)Dynamic test input generation for web applications., , , , , и . ISSTA, стр. 249-260. ACM, (2008)A pedestrian passage detection method by using spinning magnets on corridors., , , , , , и . UbiComp/ISWC Adjunct, стр. 411-414. ACM, (2015)NLOS Identification and Weighted Least-Squares Localization for UWB Systems Using Multipath Channel Statistics., , , и . EURASIP J. Adv. Signal Process., (2008)Trial-and-error method for automated test data generation and its evaluation., , и . Syst. Comput. Jpn., 20 (2): 78-92 (1989)Recovery Method for Ransomware Encryption Attacks with File Extension Changing on File Server., , , и . ICMU, стр. 1-4. IEEE, (2023)Optimizing user interaction for mobile web browsing., , и . Mobile HCI, ACM, (2009)