From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Application of sim-hash algorithm and big data analysis in spam email detection system., , и . RACS, стр. 242-246. ACM, (2014)Combined ranking for multi-media web search engine., , , и . ICHIT, том 321 из ACM International Conference Proceeding Series, стр. 554-557. ACM, (2009)Measurement-based Analysis of Power Consumption Patterns for Portable Multimedia Players., , , , и . ESA, стр. 134-140. CSREA Press, (2006)Using Entropy Cluster-Based Clustering for Finding Potential Protein Complexes., и . IWBBIO (1), том 9043 из Lecture Notes in Computer Science, стр. 524-535. Springer, (2015)Design and experiments of new IP traceback method based on offline analysis., , и . Comput. Syst. Sci. Eng., (2014)Measuring similarities among intrusion detection rules on the MapReduce environment., , , и . RACS, стр. 58-60. ACM, (2014)Small DDoS defense system using routing deployment method., и . WorldCIS, стр. 204-206. IEEE, (2012)Development and verification of the DRM standard protocol for media card., , и . ICHIT, том 321 из ACM International Conference Proceeding Series, стр. 572-575. ACM, (2009)Detecting soft errors by redirection classification., , , , и . WWW, стр. 1119-1120. ACM, (2009)Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network., , и . Comput. Sci. Inf. Syst., 10 (2): 685-701 (2013)