From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms., , и . ICTAS, стр. 1-6. IEEE, (2018)A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding., , , и . ICCCS (4), том 11066 из Lecture Notes in Computer Science, стр. 135-146. Springer, (2018)Improving the Sensitivity and Specificity of Protein Homology Search by Incorporating Predicted Secondary Structures., , и . International Conference on Computational Science (2), том 3515 из Lecture Notes in Computer Science, стр. 960-967. Springer, (2005)Risk-aware vertical handoff algorithm for security access support in heterogeneous wireless networks., , и . BMEI, стр. 1515-1519. IEEE, (2012)An Adaptive and Fragile Image Watermarking Algorithm Based on Composite Chaotic Iterative Dynamic System., , и . IIH-MSP, стр. 159-162. IEEE Computer Society, (2008)Irrelevant variability normalization in learning HMM state tying from data based on phonetic decision-tree., и . ICASSP, стр. 577-580. IEEE Computer Society, (1999)Convolutional neural network with multi-task learning scheme for acoustic scene classification., , и . APSIPA, стр. 1347-1350. IEEE, (2017)An Efficient Retrieval Method for Astronomical Catalog Time Series Data., , , , , , и . ICA3PP (1), том 11334 из Lecture Notes in Computer Science, стр. 284-298. Springer, (2018)PRIME: Peptide robust identification from MS/MS spectra., , и . APBC, стр. 181-190. Imperial College Press, London, (2005)How We Found These Vulnerabilities in Android Applications.. SecureComm (2), том 153 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 399-406. Springer, (2014)