From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , и . CSSE (3), стр. 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.Coded aperture compressive temporal imaging, , , , , , , и . CoRR, (2013)A cyber-physical approach to a wide-area actionable system for the power grid., , , и . MILCOM, стр. 1-6. IEEE, (2012)Poster reception - A study of process arrival patterns for MPI collective operations., , и . SC, стр. 142. ACM Press, (2006)Validation of Code-Improving Transformations for Embedded Systems., , и . SAC, стр. 684-691. ACM, (2003)Distributed Path Reservation Algorithms for Multiplexed All-Optical Interconnection Networks., , и . IEEE Trans. Computers, 48 (12): 1355-1363 (1999)Performance of Multi-hop Communications Using Logical Topologies on Optical Torus Networks., , и . J. Parallel Distributed Comput., 61 (6): 748-766 (2001)Waveform Optimization for MIMO Joint Communication and Radio Sensing Systems with Imperfect Channel Feedbacks., , , , и . ICC Workshops, стр. 1-6. IEEE, (2020)Wavelength Assignment to Minimize the Number of SONET ADMs in WDM Rings., и . Photonic Netw. Commun., 5 (1): 59-68 (2003)LID Assignment in InfiniBand Networks., , и . IEEE Trans. Parallel Distributed Syst., 20 (4): 484-497 (2009)