From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The law of the iterated logarithm for additive functionals of Markov chains, и . Statistics & Probability Letters, 78 (3): 265--270 (15.02.2008)Mobility Resistant Clustering in Multi-Hop Wireless Networks., , и . J. Networks, 1 (1): 12-19 (2006)Research on the Complexity and Chaos Control about a Closed-Loop Supply Chain with Dual-Channel Recycling and Uncertain Consumer Perception., , , и . Complex., (2018)The Practice Strategy for Adaptive Chinese Grammar Learning System., и . ICCSE, стр. 770-773. IEEE, (2020)Research and Implementation on Multi-beacon Aided AUV Integrated Navigation Algorithm Based on UKF., , , и . ICVISP, стр. 67:1-67:5. ACM, (2018)Factors Affecting ENF Capture in Audio., , , , , и . IEEE Trans. Inf. Forensics Secur., 14 (2): 277-288 (2019)A Supervised Multi-Spike Learning Algorithm for Spiking Neural Networks., , и . IJCNN, стр. 1-7. IEEE, (2018)Study on Dynamic Variation Regularities of Regional Groundwater Depth Based on Complexity Diagnosis., , , и . CCTA (2), том 369 из IFIP Advances in Information and Communication Technology, стр. 72-83. Springer, (2011)Hypervisor-based protection of sensitive files in a compromised system., , , , и . SAC, стр. 1765-1770. ACM, (2012)Study on police graphic plotting technology based on web., , , , и . ICSCA, стр. 137-143. ACM, (2017)