From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Public key cryptography-based security scheme for wireless sensor networks in healthcare., , , и . ICUIMC, стр. 5. ACM, (2010)Indexation des émotions dans les documents audiovisuels à partir de la modalité auditive. (Indexing emotions in audiovisual documents using the auditory modality).. Hanoi University of Science and Technology, Vietnam, (2009)Testing reliability and validity of the Vietnamese version of the eHealth literacy scale (eHEALS) among medical students in Vietnam., , , , , , , и . Int. J. Medical Informatics, (2023)Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program., , , , и . J. Biomed. Informatics, (2014)Performance Evaluation of Quick-Start in Low Latency Networks., , , , и . CCNC, стр. 1-3. IEEE, (2010)A Trust-Based Security Architecture for Ubiquitous Computing Systems., , , , , и . ISI, том 3975 из Lecture Notes in Computer Science, стр. 753-754. Springer, (2006)An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks., , , , и . ISI, том 3975 из Lecture Notes in Computer Science, стр. 735-736. Springer, (2006)Assessing the Usage of a Guideline-Driven Interactive Case Simulation Tool for Insomnia Screening and Treatment in an HIV Clinical Education Program., , и . MedInfo, том 192 из Studies in Health Technology and Informatics, стр. 323-327. IOS Press, (2013)Correlations between Promotional Activities and Usage of a Guideline-Driven Interactive Case Simulation Tool., , и . AMIA, AMIA, (2013)Secured WSN-integrated cloud computing for u-Life Care., , , , , , , , , и 2 other автор(ы). CCNC, стр. 1-2. IEEE, (2010)