From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

VoIP: making secure calls and maintaining high call quality., , , , и . MoMM, стр. 56-62. ACM, (2010)Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective., , и . MoMM, стр. 263-266. ACM, (2012)Neural-Network-Based Models for Short-Term Traffic Flow Forecasting Using a Hybrid Exponential Smoothing and Levenberg-Marquardt Algorithm., , , и . IEEE Trans. Intell. Transp. Syst., 13 (2): 644-654 (2012)A User-Based Early Warning Service Management Framework in Cloud Computing., , , , , и . Comput. J., 58 (3): 472-496 (2015)ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys., , , , , , и . 3PGCIC, стр. 465-470. IEEE Computer Society, (2010)A framework for patient practitioner information exchange., , и . CBMS, стр. 408-414. IEEE Computer Society, (2010)Web-of-things framework for cyber-physical systems., , , , и . Concurr. Comput. Pract. Exp., 23 (9): 905-923 (2011)Selection of Significant On-Road Sensor Data for Short-Term Traffic Flow Forecasting Using the Taguchi Method., , , , , и . IEEE Trans. Ind. Informatics, 8 (2): 255-266 (2012)Watermarking technique for wireless multimedia sensor networks: a state of the art., , и . CUBE, стр. 832-840. ACM, (2012)Is There Self-Similarity in Cloud QoS Data?, , , и . ICEBE, стр. 76-81. IEEE Computer Society, (2013)