From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors., , , , , и . WWIC, том 5546 из Lecture Notes in Computer Science, стр. 73-84. Springer, (2009)SORU: A Reconfigurable Vector Unit for Adaptable Embedded Systems., , , , , , , , , и 2 other автор(ы). ARC, том 5453 из Lecture Notes in Computer Science, стр. 255-260. Springer, (2009)Self-organizing Maps versus Growing Neural Gas in Detecting Anomalies in Data Centres., , , , и . Log. J. IGPL, 23 (3): 495-505 (2015)Detecting Unknown Attacks in Wireless Sensor Networks Using Clustering Techniques., , , и . HAIS (1), том 6678 из Lecture Notes in Computer Science, стр. 214-221. Springer, (2011)Comparative study of meta-heuristic 3D floorplanning algorithms., , , , , , , и . Neurocomputing, (2015)Reproducible and accurate subject-wise sleep posture detection by detecting and removing turns., , , , , и . COINS, стр. 1-6. IEEE, (2022)Dynamic environment evaluation for reliable AmI applications based on untrusted sensor., , и . SECURWARE, стр. 128-131. IEEE Computer Society, (2007)Decision Support Framework for Automating the Optimization of Edge Computing Federations., , , , , и . ANNSIM, стр. 49-60. IEEE, (2023)Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps., , , и . CISIS, том 6694 из Lecture Notes in Computer Science, стр. 9-16. Springer, (2011)Modular Framework for Smart Home Applications., , , , , , , , и . IWANN (2), том 5518 из Lecture Notes in Computer Science, стр. 695-701. Springer, (2009)