From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Social networking searching and privacy issues., и . Inf. Secur. Tech. Rep., 16 (2): 74-78 (2011)MAPBOT: a Web based map information retrieval system., и . Inf. Softw. Technol., 45 (10): 691-698 (2003)Facilitating resource discovery in grid environments with peer-to-peer structured tuple spaces., и . Peer-to-Peer Netw. Appl., 2 (4): 283-297 (2009)Dealing With Uncertain Entities in Ontology Alignment Using Rough Sets., , , , и . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1600-1612 (2012)Novel Architecture for Human Re-Identification with a Two-Stream Neural Network and Attention Mechanism., и . Comput. Informatics, 41 (4): 905-930 (2022)Research on UBI Auto Insurance Pricing Model Based on Parameter Adaptive SAPSO Optimal Fuzzy Controller., , , , , и . Comput. Informatics, 41 (4): 1078-1113 (2022)Petri net-based deviation detection between a process model with loop semantics and event logs., , , , и . Concurr. Comput. Pract. Exp., (2018)Transformers only look once with nonlinear combination for real-time object detection., , , , и . Neural Comput. Appl., 34 (15): 12571-12585 (2022)Fighting cybercrime: legislation in China., , и . Int. J. Electron. Secur. Digit. Forensics, 2 (2): 219-227 (2009)Data security of Android applications., и . ICNC-FSKD, стр. 1716-1721. IEEE, (2016)