From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Examining Competitive Intelligence Using External and Internal Data Sources: A Text Mining Approach., , и . AMCIS, Association for Information Systems, (2015)Mining Competitive Intelligence from Social Media: A Case Study of IBM., , и . PACIS, стр. 313. (2018)Biometric verification using hand vein-patterns.. WCNIS, стр. 677-681. IEEE, (2010)A Data Protection Scheme via Isolating Android Partitions., , , , , , и . CSS (1), том 11982 из Lecture Notes in Computer Science, стр. 89-101. Springer, (2019)A Partition Approach to Lower Bounds for Zero-Visibility Cops and Robber., , , и . IWOCA, том 11638 из Lecture Notes in Computer Science, стр. 442-454. Springer, (2019)A method of face recognition based on fuzzy clustering and parallel neural networks., , и . Signal Process., 86 (8): 2026-2039 (2006)Service offloading oriented edge server placement in smart farming., , , , , и . Softw. Pract. Exp., 51 (12): 2540-2557 (2021)A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints., , , и . Future Gener. Comput. Syst., (2020)A Transparent Encryption Scheme of Video Data for Android Devices., , , , и . CSE/EUC (1), стр. 817-822. IEEE Computer Society, (2017)Cost Effective MLaaS Federation: A Combinatorial Reinforcement Learning Approach., , , и . INFOCOM, стр. 2078-2087. IEEE, (2022)