From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Research on hiberarchy trusted network based on the grade division., , , , и . ISKE, стр. 19-25. IEEE, (2008)Feature evaluation and selection with cooperative game theory., , , , , и . Pattern Recognit., 45 (8): 2992-3002 (2012)A Novel Planar IPPCT Tree Structure and Characteristics Analysis., , и . J. Softw., 5 (3): 344-351 (2010)A Robust Dynamic Watermarking Scheme Based on STBDW., , , и . CSIE (7), стр. 602-606. IEEE Computer Society, (2009)A New Remediation Model Based on Trusted Network., , , , и . CIS (2), стр. 242-245. IEEE Computer Society, (2008)978-0-7695-3508-1.A Novel Method-Based Software Watermarking Scheme., , , и . ITNG, стр. 388-392. IEEE Computer Society, (2009)A DoS Detection Method Based on Composition Self-Similarity., , , , и . KSII Trans. Internet Inf. Syst., 6 (5): 1463-1478 (2012)