From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comments on "Theory and Applications of Cellular Automata in Cryptography"., , и . IEEE Trans. Computers, 46 (5): 637-638 (1997)Partnering with EDA Vendors: Tips, Techniques, and the Role of Standards.. DAC, стр. 131-134. ACM Press, (1994)RTS/CTS Based Endpoint Admission Control for VoIP Over 802.11e., , и . MMNS, том 4267 из Lecture Notes in Computer Science, стр. 223-234. Springer, (2006)Geometric Ideas for Cryptographic Equation Solving in Even Characteristic., и . IMACC, том 5921 из Lecture Notes in Computer Science, стр. 202-221. Springer, (2009)Multi-Robot Warehouse Optimization: Leveraging Machine Learning for Improved Performance., , , , , , , , , и 4 other автор(ы). AAMAS, стр. 3047-3049. ACM, (2023)IEEE802.11k-assisted load balancing (K-LB) for Peer-to-Peer content distribution over mobile SCTP., , и . IWCMC, стр. 683-688. IEEE, (2011)On the Use of Web Assembly in a Serverless Context., , , и . XP Workshops, том 396 из Lecture Notes in Business Information Processing, стр. 141-145. Springer, (2020)Corporate Metamorphosis: The Effects of the New Media.. First Monday, (1996)Architecture of a Self Configuration Framework for 802.11-based multi-radio Mesh Networks., , и . WOWMOM, стр. 1-8. IEEE Computer Society, (2013)A Methodology for Predicting the Performance of Component-Based Applications, , и . Proceedings of the Eighth International Workshop on Component-Oriented Programming (WCOP'03), (июня 2003)