From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A study of rough sets based on 1-neighborhood systems., , и . Inf. Sci., (2013)Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks., , , , и . MobiHoc, стр. 401-410. ACM, (2008)A mobile phone-based physical-social location proof system for mobile social network service., , , , , , и . Secur. Commun. Networks, 9 (13): 1890-1904 (2016)MPSL: A Mobile Phone-Based Physical-Social Location Verification System., , , , и . WASA, том 7405 из Lecture Notes in Computer Science, стр. 488-499. Springer, (2012)Malicious Shellcode Detection with Virtual Memory Snapshots., , , , и . INFOCOM, стр. 974-982. IEEE, (2010)Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks., , , , и . IEEE Trans. Mob. Comput., 9 (3): 435-448 (2010)Pattern Mutation in Wireless Sensor Deployment., , , , и . INFOCOM, стр. 2480-2488. IEEE, (2010)Connected coverage in wireless networks with directional antennas., , , , и . INFOCOM, стр. 2264-2272. IEEE, (2011)Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks., , , , и . IEEE Trans. Parallel Distributed Syst., 18 (12): 1784-1796 (2007)Mobile phone-based pervasive fall detection., , , , и . Personal and Ubiquitous Computing, 14 (7): 633-643 (2010)