From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The L-fuzzy vector subspace degrees and its induced convex structure., и . Comput. Appl. Math., 43 (3): 131 (апреля 2024)The study of sustainable development of alpine pastoral region in eastern Tibetan Plateau based on the model of emergy ecological footprint., , , , и . IGARSS, стр. 6074-6077. IEEE, (2016)A Distributed Synchronization Algorithm for Femtocells Network., , и . WICON, том 121 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 96-103. Springer, (2013)Tracking control of Join-Free Timed continuous Petri Net Systems., , и . ADHS, том 39 из IFAC Proceedings Volumes, стр. 30-36. Elsevier, (2006)Library Microblogging Based on Sina Microblogging Platform., , и . ICICA (1), том 307 из Communications in Computer and Information Science, стр. 702-707. Springer, (2012)Efficient Identity-Based Protocol for Fair Certified E-mail Delivery., , и . CANS, том 3810 из Lecture Notes in Computer Science, стр. 200-210. Springer, (2005)Novel techniques for Rayleigh noise suppression and multicast transmission in wavelength division multiplexed passive optical networks.. Chinese University of Hong Kong, Hong Kong, (2011)ndltd.org (oai:cuhk-dr:cuhk_344826).Continuous Time Bayesian Networks for Host Level Network Intrusion Detection., и . ECML/PKDD (2), том 5212 из Lecture Notes in Computer Science, стр. 613-627. Springer, (2008)A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks., , и . SECRYPT, стр. 269-274. SciTePress, (2011)Certificateless Public-Key Signature: Security Model and Efficient Construction., , , и . ACNS, том 3989 из Lecture Notes in Computer Science, стр. 293-308. (2006)