From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A critique of recently proposed buffer-sizing strategies., , , и . Comput. Commun. Rev., 37 (1): 43-48 (2007)Decentralized Assignment of Electric Vehicles at Charging Stations Based on Personalized Cost Functions and Distributed Ledger Technologies., , , и . IEEE Internet Things J., 8 (14): 11112-11122 (2021)A Distributed and Privacy-Aware Speed Advisory System for Optimizing Conventional and Electric Vehicle Networks., , , , , и . IEEE Trans. Intell. Transp. Syst., 17 (5): 1308-1318 (2016)Integral action for setpoint regulation control of a reaction-diffusion equation in the presence of a state delay., , и . Autom., (2021)Secure Access Control for DAG-based Distributed Ledgers., , , , , и . CoRR, (2021)On the design of a route parsing engine for connected vehicles with applications to congestion management systems., , , и . ITSC, стр. 1586-1591. IEEE, (2016)Distributed Ledger Technology for IoT: Parasite Chain Attacks., , , и . CoRR, (2019)Modelling TCP Throughput and Fairness., и . NETWORKING, том 3042 из Lecture Notes in Computer Science, стр. 938-948. Springer, (2004)AIMD in a discrete time implementation or with a non-constant shared resource., , , и . AuCC, стр. 230-235. IEEE, (2015)Person-Specific Standardized Vulnerability Assessment in Health and Social Care., , и . MedInfo, том 216 из Studies in Health Technology and Informatics, стр. 462-466. IOS Press, (2015)