From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling Hardware Trojans in 3D ICs., и . ISVLSI, стр. 483-488. IEEE, (2019)A Cool Scheduler for Multi-Core Systems Exploiting Program Phases., и . IEEE Trans. Computers, 63 (5): 1061-1073 (2014)Methods for Calculating the Transmission Torque of Magnetic Transmission Mechanisms., , и . PROLAMAT, том 207 из IFIP, стр. 631-636. Springer, (2006)Combined buffer pre-allocation and siphon control for deadlock prevention in Petri nets, и . International Journal of Production Research, 49 (20): 6125--6154 (20.01.2011)H-infinity stability analysis and output feedback control for fuzzy stochastic networked control systems with time-varying communication delays and multipath packet dropouts., , , , , и . Neural Comput. Appl., 32 (18): 14733-14751 (2020)An Interpretable Moderated Mediation Model: How does Punctum Image Influence Tourists' Behavioral Intention?, , , , , , и . Appl. Artif. Intell., (декабря 2023)Robust stability analysis and feedback control for networked control systems with additive uncertainties and signal communication delay via matrices transformation information method., , , и . Inf. Sci., (2022)A note on "Generalized fuzzy rough approximation operators based on fuzzy coverings"., , и . Int. J. Approx. Reason., 52 (8): 1195-1197 (2011)False Data Injection-Resilient Security Routing Protocol for Wireless Sensor Networks., и . J. Networks, 7 (12): 2025-2030 (2012)Robust physics discovery via supervised and unsupervised pattern recognition using the Euler characteristic., и . CoRR, (2021)