From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Risk Management Using Behavior Based Bayesian Networks., и . ISI, том 3495 из Lecture Notes in Computer Science, стр. 115-126. Springer, (2005)Call Algebra., и . CCNC, стр. 854-858. IEEE, (2008)Socio-technical defense against voice spamming., и . ACM Trans. Auton. Adapt. Syst., 2 (1): 2 (2007)Nuisance level of a voice call., , и . ACM Trans. Multim. Comput. Commun. Appl., 5 (1): 6:1-6:22 (2008)Real-time Incremental Speech-to-Speech Translation of Dialogs., , , , и . HLT-NAACL, стр. 437-445. The Association for Computational Linguistics, (2012)A Novel Scheduling Strategy for MMT-Based Multipath Video Streaming., , , , , и . GLOBECOM, стр. 206-212. IEEE, (2018)Automatic Calibration Using Receiver Operating Characteristics Curves., , и . COMSWARE, IEEE, (2007)Ad-Net: Audio-Visual Convolutional Neural Network for Advertisement Detection In Videos., , , и . CoRR, (2018)Network risk management using attacker profiling., , и . Secur. Commun. Networks, 2 (1): 83-96 (2009)Risk Management using Behavior based Attack Graphs., , и . ITCC (1), стр. 445-449. IEEE Computer Society, (2004)