From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , и . IAS, стр. 3-8. IEEE Computer Society, (2007)A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , и . SEC, том 214 из IFIP Conference Proceedings, стр. 239-250. Kluwer, (2002)Incremental concept-cognitive learning based on attribute topology., , , и . Int. J. Approx. Reason., (2020)An algorithm for overlapping community detection in complex network., , , , , и . FSKD, стр. 732-738. IEEE, (2015)A continuous reverse skyline query processing method in moving objects environments., , , и . Data Knowl. Eng., (2016)Differential Equations for Modeling Asynchronous Algorithms., , , , и . IJCAI, стр. 2220-2226. ijcai.org, (2018)System Stability Via Stepping Optimal Control: Theory and Applications., , , и . EPIA Workshops, том 4874 из Lecture Notes in Computer Science, стр. 463-472. Springer, (2007)Shaft orbit analysis based on LabVIEW for fault diagnosis of rotating machinery., , , и . ICCSE, стр. 972-975. IEEE, (2016)Design and Implementation of Portable Multifunctional Data Acquisition Terminal., , , и . HPCC/EUC, стр. 1733-1738. IEEE, (2013)A Weakly-Supervised Anomaly Detection Method via Adversarial Training for Medical Images., , , , , , , , и . ICCE, стр. 1-4. IEEE, (2022)