From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design of network transmission model for end-to-end communication.. ICAIIS, стр. 343:1-343:5. ACM, (2021)Time Series Models for Internet Data Traffic., и . LCN, стр. 164-171. IEEE Computer Society, (1999)A high-energy-density sugar biobattery based on a synthetic enzymatic pathway, , , , , , , , , и . Nat. Commun., (2014)Research on the architecture of vulnerability discovery technology., , , и . ICMLC, стр. 2854-2859. IEEE, (2010)Machining feature recognition and tool-path generation for 3-axis CNC milling., и . Comput. Aided Des., 38 (6): 553-562 (2006)Implementing AI as Cyber IoT Devices: The House Valuation Example., , , , и . IEEE Trans. Ind. Informatics, 16 (4): 2612-2620 (2020)Tool Path Generation for Arbitrary Pockets with Islands., и . J. Intell. Manuf., 17 (3): 275-283 (2006)IoT-Based Strawberry Disease Detection With Wall-Mounted Monitoring Cameras., , , , , , и . IEEE Internet Things J., 11 (1): 1439-1451 (января 2024)A Template Attack to Reconstruct the Input of SHA-3 on an 8-Bit Device., и . COSADE, том 12244 из Lecture Notes in Computer Science, стр. 25-42. Springer, (2020)Single-Trace Fragment Template Attack on a 32-Bit Implementation of Keccak., и . CARDIS, том 13173 из Lecture Notes in Computer Science, стр. 3-23. Springer, (2021)