From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Latent Topic Visual Language Model for Object Categorization., , , и . SIGMAP, стр. 149-158. SciTePress, (2011)Hybrid greedy heuristics based on linear programming for the three-dimensional single bin-size bin packing problem., , и . ITOR, 21 (1): 59-79 (2014)An Interoperability Points Based Interoperability Approach for SaaS Applications., , , и . IWEI, том 144 из Lecture Notes in Business Information Processing, стр. 22-35. Springer, (2013)A Process Interoperability Method for SMEs., , , , и . IWEI, том 76 из Lecture Notes in Business Information Processing, стр. 50-60. Springer, (2011)Program comprehension with dynamic recovery of code collaboration patterns and roles., , и . CASCON, стр. 56-67. IBM, (2004)New public ROI value propositions on the basis of the cases of Chinese Government IT., и . ICEGOV, том 444 из ACM International Conference Proceeding Series, стр. 189-194. ACM, (2010)Airworthiness Compliance Criteria in Ergonomic Design of Cursor Control Device for Civil Aircraft., и . HCI (6), том 11571 из Lecture Notes in Computer Science, стр. 332-341. Springer, (2019)Honeypot detection in advanced botnet attacks., , , и . Int. J. Inf. Comput. Secur., 4 (1): 30-51 (2010)Analysis of the Gradient Descent Algorithm for a Deep Neural Network Model with Skip-connections., , , и . CoRR, (2019)Harnessing the power of BitTorrent for distributed denial-of-service attacks., , , и . Secur. Commun. Networks, 4 (8): 860-870 (2011)