From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , и . CSSE (3), стр. 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.Communication Characteristics in the NAS Parallel Benchmarks., и . IASTED PDCS, стр. 724-729. IASTED/ACTA Press, (2002)Coded aperture compressive temporal imaging, , , , , , , и . CoRR, (2013)A cyber-physical approach to a wide-area actionable system for the power grid., , , и . MILCOM, стр. 1-6. IEEE, (2012)An Improved Image Reconstruction Algorithm., , , и . CCIS, стр. 386-389. IEEE, (2018)Validation of Code-Improving Transformations for Embedded Systems., , и . SAC, стр. 684-691. ACM, (2003)Poster reception - A study of process arrival patterns for MPI collective operations., , и . SC, стр. 142. ACM Press, (2006)Inference of gene networks associated with the host response to infectious disease., , , , и . Big Data over Networks, Cambridge University Press, (2016)Multi-Prototype Networks for Unconstrained Set-based Face Recognition., , , , , , , , и . IJCAI, стр. 4397-4403. ijcai.org, (2019)How much can sub-band virtual concatenation (VCAT) help static routing and spectrum assignment in elastic optical networks? (Invited)., и . ICCS, стр. 273-277. IEEE, (2014)