From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Rule-Based Ontology for Context-Aware Computing., , , и . BMEI, стр. 1-4. IEEE, (2009)Situation prediction of large-scale Internet of Things network security., , , и . EURASIP J. Information Security, (2019)STITCHER: Correlating Digital Forensic Evidence on Internet-of-Things Devices., , и . CoRR, (2020)AisLSM: Revolutionizing the Compaction with Asynchronous I/Os for LSM-tree., , , и . CoRR, (2023)Persisting RB-Tree into NVM in a Consistency Perspective., , , , , , , , и . ACM Trans. Storage, 14 (1): 6:1-6:27 (2018)How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation., , , , и . J. Syst. Archit., (2021)LAWN: boosting the performance of NVMM file system through reducing write amplification., и . DAC, стр. 6:1-6:6. ACM, (2018)Exploring Architectural Implications to Boost Performance for in-NVM B+-Tree., , и . ASP-DAC, стр. 116-121. ACM, (2023)A novel personality detection method based on high-dimensional psycholinguistic features and improved distributed Gray Wolf Optimizer for feature selection., , и . Inf. Process. Manag., 60 (2): 103217 (2023)Situation evaluate on hierarchical network security based on D-S evidence theory., и . Int. J. Commun. Networks Distributed Syst., 13 (3/4): 245-256 (2014)