From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , и . SEC, том 214 из IFIP Conference Proceedings, стр. 239-250. Kluwer, (2002)Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , и . IAS, стр. 3-8. IEEE Computer Society, (2007)Incremental concept-cognitive learning based on attribute topology., , , и . Int. J. Approx. Reason., (2020)Propagation of computer virus both across the Internet and external computers: A complex-network approach., , , , , и . Commun. Nonlinear Sci. Numer. Simul., 19 (8): 2785-2792 (2014)Dynamic Graph Repartitioning: From Single Vertex to Vertex Group., , , , и . DASFAA (2), том 12113 из Lecture Notes in Computer Science, стр. 482-497. Springer, (2020)OptQuant: Distributed training of neural networks with optimized quantization mechanisms., , , , и . Neurocomputing, (2019)Research on lifetime prediction-based recharging scheme in rechargeable WSNs., , , , , , и . NOMS, стр. 1-4. IEEE, (2018)Fault-tolerant topology control for heterogeneous wireless sensor networks using Multi-Routing Tree., , , , и . IM, стр. 620-623. IEEE, (2017)Gravitation-Based 3-D Redeployment Schemes for the Mobile Sensors and Sink in Gas Leakage Monitoring., , , , и . IEEE Access, (2017)The computation of boundary spanning for the IT-enabled commercial ecosystem., и . Clust. Comput., 20 (4): 3085-3098 (2017)