From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards security labelling., и . ACSC, том 48 из CRPIT, стр. 69-76. Australian Computer Society, (2006)Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks., , , , , , и . Sensors, 16 (4): 460 (2016)A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks., , , , и . MobiQuitous, том 73 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 186-197. Springer, (2010)Towards Context Sensitive Defeasible Rules., , и . CLIMA, том 5056 из Lecture Notes in Computer Science, стр. 193-213. Springer, (2007)A survey on real-time event detection from the Twitter data stream., , и . J. Inf. Sci., 44 (4): 443-463 (2018)On the Analysis of On-Line Database Reorganization., , и . ADBIS-DASFAA, том 1884 из Lecture Notes in Computer Science, стр. 293-306. Springer, (2000)Temporal Data Mining Using Hidden Periodicity Analysis., и . ISMIS, том 1932 из Lecture Notes in Computer Science, стр. 49-58. Springer, (2000)A non-key based security scheme supporting emergency treatment of wireless implants., , , и . ICC, стр. 647-652. IEEE, (2014)A reverse-engineering approach to subsystem structure identification., , , и . Journal of Software Maintenance, 5 (4): 181-204 (1993)The Soundness and Completeness of a Temporal Extension of Logic Programming.. ILPS, стр. 669. MIT Press, (1993)