From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Compact Data Format for Advertising and Discovery in Ubiquitous Networks., , , и . UCS, том 4836 из Lecture Notes in Computer Science, стр. 274-289. Springer, (2007)Validation of the HADRIAN System Using an ATM Evaluation Case Study., , , , , и . HCI (11), том 5620 из Lecture Notes in Computer Science, стр. 727-736. Springer, (2009)Predicting the Level of Safety Performance Using an Artificial Neural Network., , и . IHSED, том 876 из Advances in Intelligent Systems and Computing, стр. 705-710. Springer, (2018)Secret Key Capacity for Optimally Correlated Sources Under Sampling Attack., , , и . IEEE Trans. Inf. Theory, 52 (11): 5140-5151 (2006)Live Programming in Scientific Simulation., , , , и . Supercomput. Front. Innov., 2 (4): 4-15 (2015)Self-Organizing Location Estimation Method using Ad-hoc Networks., , , , , и . MDM, стр. 53. IEEE Computer Society, (2006)Wireless Information Sharing in Ubiquitous Environments., , , , и . MDM, стр. 54. IEEE Computer Society, (2006)Adaptive Networks with Self-Organizing Multi-Hop Links.. Evolvable Hardware, стр. 145-. IEEE Computer Society, (1999)A Scaling Theory for Distributed Sparse Matrix Coding in the CEO Problem., и . ISIT, стр. 2428-2432. IEEE, (2006)Secret key agreement under sampling attack., , , и . ISIT, стр. 2147-2151. IEEE, (2005)