From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detection of anomalous packet traffic via entropy., , и . CCECE, стр. 137-141. IEEE, (2009)Naïve Creature with Fear and Desire Learning to Cross a Highway., , и . ICCS, том 29 из Procedia Computer Science, стр. 343-353. Elsevier, (2014)IEEE CIS Webinars Activities and Future Plan Society Briefs., , и . IEEE Comput. Intell. Mag., 6 (3): 4-5 (2011)Biomimicri based cognitive agent and its simulator., , и . CCECE, стр. 1-7. IEEE, (2014)Impact of Coupling of Distributed Denial of Service Attack with Routing on Throughput of Packet Switching Network., , и . ACRI, том 6350 из Lecture Notes in Computer Science, стр. 322-333. Springer, (2010)Netzwerk: Migration of a Packet-Switching Network Simulation Environment from MS Windows PC to Linux PC and to HPC., , , и . HPCS, стр. 280-286. IEEE Computer Society, (2005)Development of Road Traffic CA Model of 4-Way Intersection to Study Travel Time., и . Complex (2), том 5 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 2040-2049. Springer, (2009)Computational intelligence based architecture for cognitive agents., и . ICCS, том 1 из Procedia Computer Science, стр. 2227-2235. Elsevier, (2010)DDoS attack detection using entropy of packet traffic in CA like data communication network model., , и . Automata, стр. 573-585. Luniver Press, Frome, UK, (2008)Development of CA model of highway traffic., и . Automata, стр. 527-541. Luniver Press, Frome, UK, (2008)