From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing., , , , , , и . Quantum Inf. Process., 20 (7): 1-12 (2021)IoT-Based Information System on Cold-Chain Logistics Service Quality (ICCLSQ) Management in Logistics 4.0., , , и . Inf. Syst. Frontiers, 26 (2): 689-708 (апреля 2024)A Transformer-Assisted Cascade Learning Network for Choroidal Vessel Segmentation., , , , , , , , и . J. Comput. Sci. Technol., 39 (2): 286-304 (марта 2024)Formal Evaluation of Major Authentication Methods for IEEE 802.11i WLAN Standard., и . VTC Fall, стр. 1-5. IEEE, (2006)A Modeling and Analysis Framework for Knowledge System Based on Meta-Network Approach., и . WHICEB, стр. 14. Association for Information Systems, (2014)Resequencing of 200 human exomes identifies an excess of low-frequency non-synonymous coding variants, , , , , , , , , и 28 other автор(ы). Nat Genet, 42 (11): 969--972 (ноября 2010)A stimulator output stage with capacitor reduction and failure-checking techniques., , и . ISCAS, IEEE, (2006)An Abundance of Rare Functional Variants in 202 Drug Target Genes Sequenced in 14,002 People, , , , , , , , , и 21 other автор(ы). Science, (2012)Research on Life Characteristics of Internet Based on Network Motifs., , и . CoRR, (2016)A Probabilistic Strategy for Setting Temporal Constraints in Scientific Workflows., , и . BPM, том 5240 из Lecture Notes in Computer Science, стр. 180-195. Springer, (2008)