From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intrusion Confinement by Isolation in Information Systems, , и . Journal of Computer Security, (2000)Lost at the Center of a Circle: A Failure Mode and Its Remedy in the Two-Step Weighted Least Squares Method., , , , , и . VTC Spring, стр. 1-5. IEEE, (2011)Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI., и . GLOBECOM, стр. 1-6. IEEE, (2009)Modeling and Checking the Security of DIFC System Configurations., и . SafeConfig, стр. 21-38. Springer, (2012)Evaluating Intrusion-Tolerant Certification Authority Systems., , и . Quality and Reliability Eng. Int., 28 (8): 825-841 (2012)An Opportunistic Protocol Employing Independent Codebooks for Bidirectional Cooperative Networks., , и . IEEE Trans. Vehicular Technology, 62 (2): 902-908 (2013)Rate-Based Watermark Traceback: A New Approach., , и . ISPEC, том 6047 из Lecture Notes in Computer Science, стр. 172-186. Springer, (2010)A Statistical Spam Filtering Scheme Based on Grid Platform., , и . IFSA (2), том 42 из Advances in Soft Computing, стр. 527-534. Springer, (2007)On the Unambiguous Distance of Multi-Carrier Phase Ranging with Random Hopped Frequencie., , , и . CoRR, (2017)Word graph based speech rcognition error correction by handwriting input., и . ICMI, стр. 339-346. ACM, (2006)