From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack., , , , и . ICICS, том 7618 из Lecture Notes in Computer Science, стр. 321-330. Springer, (2012)Real-Time Visualization and Interaction of Three-dimensional Human CT Images., , , , , , и . J. Comput., 5 (9): 1335-1342 (2010)Event-Based Modeling and Analysis of Sensor Enabled Networked Manufacturing Systems., , , и . IEEE Trans Autom. Sci. Eng., 15 (4): 1930-1945 (2018)An Imaginary Interference-Free Method for MIMO Precoding in FBMC/OQAM Systems., , , , , и . IEEE Trans. Broadcast., 67 (3): 642-650 (2021)A universal distributed model for password cracking., , и . ICMLC, стр. 955-960. IEEE, (2011)Three-Materials Image Recover from Value Range Projection Data., , , , и . ISDA (1), том 940 из Advances in Intelligent Systems and Computing, стр. 303-314. Springer, (2018)HDAA: High-Speed Data Acquisition Algorithm of IoT., , , , , и . ICCSIP (2), том 1006 из Communications in Computer and Information Science, стр. 488-499. Springer, (2018)Deep Regression Model for Received Signal Strength based WiFi Localization., , , , и . DSP, стр. 1-4. IEEE, (2018)Analysis of a misjudged partial discharge in switchgear., , , , , и . iSPEC, стр. 1-3. IEEE, (2023)Personal Assistant: A Case Study on Web Service vs. Web Based Application., , и . International Conference on Internet Computing, стр. 853-858. CSREA Press, (2004)