From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mathematical models of tumor growth using Voronoi tessellations in pathology slides of kidney cancer., , , , и . EMBC, стр. 4454-4457. IEEE, (2015)Markov Chain Models for Genetic Algorithm Based Topology Control in MANETs., , , , , , и . EvoApplications (2), том 6025 из Lecture Notes in Computer Science, стр. 41-50. Springer, (2010)Interoperability of secure VoIP terminals., , , , , , , , и . BlackSeaCom, стр. 172-176. IEEE, (2013)Testbed Implementation of Genetic Algorithms for Self Spreading Nodes in MANETs., , , , и . GEM, стр. 10-16. CSREA Press, (2008)Differential Evolution Based Fault Tolerant Topology Control in MANETs., , , , и . MILCOM, стр. 864-869. IEEE, (2013)Network Planning for Multicast Using Partitioned Virtual User Domains., , , , , и . MMNS, том 4787 из Lecture Notes in Computer Science, стр. 113-124. Springer, (2007)Specification of Timed EFSM Fault Models in SDL., , , и . FORTE, том 4574 из Lecture Notes in Computer Science, стр. 50-65. Springer, (2007)AI and Game Theory based Autonomous UAV Swarm for Cybersecurity., , , , , и . MILCOM, стр. 1-6. IEEE, (2019)An algorithmic procedure for checking safety properties of protocols., , и . IEEE Trans. Commun., 37 (9): 940-948 (1989)Reliable Server Pooling in Highly Mobile Wireless Networks., , , и . ISCC, стр. 627-632. IEEE Computer Society, (2003)