From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TCAM-based classification using divide-and-conquer for range expansion., , , и . ICCCN, стр. 1-8. IEEE, (2014)REAR: A radio environment adaptive routing protocol for CR Mobile Ad hoc Networks., , , и . ICT, стр. 112-117. IEEE, (2015)An efficient key management scheme for secure wireless multicast., , и . ICC, стр. 1236-1240. IEEE, (2002)A new model for function areas layout in logistics park considering the impact of traffic organization., и . ITSC, стр. 2339-2345. IEEE, (2016)Revealing temporal features of attacks against smart grid., , , и . ISGT, стр. 1-6. IEEE, (2013)A new bandwidth-efficient multicast routing scheme for mobile Ad hoc Networks., , , и . WTS, стр. 1-7. IEEE, (2015)Synthetic Forgery Attack against Continuous Keystroke Authentication Systems., и . ICCCN, стр. 1-7. IEEE, (2018)Diagnose the mild cognitive impairment by constructing Bayesian network with missing data., , , , и . Expert Syst. Appl., 38 (1): 442-449 (2011)Bidirectional Range Extension for TCAM-Based Packet Classification., и . Networking, том 6091 из Lecture Notes in Computer Science, стр. 351-361. Springer, (2010)Double Verifiably Encrypted Signature-Based Contract Signing Protocol., , и . ICICA (LNCS), том 6377 из Lecture Notes in Computer Science, стр. 86-93. Springer, (2010)