From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Intrusion Detection Method for Mobile Ad Hoc Networks., , и . EGC, том 3470 из Lecture Notes in Computer Science, стр. 1183-1192. Springer, (2005)Performance Analysis of a Novel MAC Protocol For Service Differentiation In Wireless Network., , и . ICWN, стр. 148-154. CSREA Press, (2005)A framework for WWW user activity analysis based on user interest., , и . Knowl. Based Syst., 21 (8): 905-910 (2008)An Intersection-Centric Priority Algorithm for Traffic Simulation Based on Multi-Agents., , , и . NCM (1), стр. 189-194. IEEE Computer Society, (2008)A 15 - 34 GHz Robust GaN based Low-Noise Amplifier with 0.8dB Minimum Noise Figure., , , , , и . NEWCAS, стр. 1-4. IEEE, (2019)Cube attack on reduced-round Enhanced-Bivium., , и . SSIC, стр. 1-4. IEEE, (2016)Task Allocation Adaptable to Network Topology among Cooperative., , и . CIT, стр. 457-462. IEEE Computer Society, (2007)Research and Design on a Novel OGSA-Based Open Content Alliance Scheme., , и . GCC, том 3251 из Lecture Notes in Computer Science, стр. 440-447. Springer, (2004)STRESS: An IPv6 to IPv4 Converter for Sniffing Software., , и . CITS, стр. 1-5. IEEE, (2016)Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks., , , и . IMSCCS, стр. 83-90. IEEE Computer Society, (2008)