From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Remodeling and Simulation of Intrusion Detection Evaluation Dataset., , и . Security and Management, стр. 245-251. CSREA Press, (2006)A Nonconforming Characteristic Finite Element Method for Nonlinear Advection-Dominated Diffusion Equation with Memory Term., , и . BIC-TA, том 212 из Advances in Intelligent Systems and Computing, стр. 179-187. Springer, (2013)User Profiling for Query Refinement., , , и . AMCIS, Association for Information Systems, (2014)Stability analysis of neutral stochastic delay differential equations by a generalisation of Banach's contraction principle., , и . Int. J. Control, 90 (8): 1555-1560 (2017)Evaluation Model for Breast Cancer Susceptibly Gene and its Implementation Using Cytoscape., и . BMEI, стр. 1-5. IEEE, (2009)An improved feature matching algorithm with low memory requirement., , , и . CISP-BMEI, стр. 270-274. IEEE, (2016)Computing minimum cuts in hypergraphs., и . CoRR, (2016)Linear Cryptanalysis of FASER128/256 and TriviA-ck., , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 237-254. Springer, (2014)Fast and Efficient Basis Selection Methods for Embedded Wavelet Packet Image Coding., и . ICIAR (1), том 4141 из Lecture Notes in Computer Science, стр. 480-492. Springer, (2006)Demo: Finger and Hand Gesture Recognition using Smartwatch., , , и . MobiSys, стр. 471. ACM, (2015)