From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Coverage and Exposure Paths in Wireless Sensor Networks., , , , и . J. Comput. Sci. Technol., 21 (4): 490-495 (2006)Practical indoor tracking using Wireless Sensor Networks., , , , и . WPNC, стр. 209-215. IEEE, (2009)Community-Aware Opportunistic Routing in Mobile Social Networks., , и . IEEE Trans. Computers, 63 (7): 1682-1695 (2014)A Threshold Multi-secret Sharing Scheme., , , и . ICNSC, стр. 1705-1707. IEEE, (2008)A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography., , , и . CCIS, стр. 487-490. IEEE, (2014)On the effect of flow table size and controller capacity on SDN network throughput., , , , и . ICC, стр. 1-6. IEEE, (2017)A decision-tree-based on-line flow table compressing method in Software Defined Networks., , , и . IWQoS, стр. 1-2. IEEE, (2016)Deadline-sensitive opportunistic utility-based routing in cyclic mobile social networks., , , , и . SECON, стр. 301-309. IEEE, (2015)Steganalysis against substitution-based linguistic steganography based on context clusters., , , , и . Comput. Electr. Eng., 37 (6): 1071-1081 (2011)Personalized Privacy-Preserving Data Aggregation for Histogram Estimation., , , , , и . GLOBECOM, стр. 1-6. IEEE, (2015)