From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Energy-efficient RISC design with on-demand circuit-level timing speculation., , , , и . ASP-DAC, стр. 477-478. IEEE, (2012)Uncertainty and Mental Workload Among Wayfinding Strategies., , , , , , и . HCI (9), том 9739 из Lecture Notes in Computer Science, стр. 556-565. Springer, (2016)Markov Clustering-Based Content Placement in Roadside-Unit Caching With Deadline Constraint., , , , , , и . IEEE Trans. Intell. Transp. Syst., 25 (9): 11881-11892 (сентября 2024)Mitigating New-Flow Attack with SDNSnapshot in P4-based SDN., , , , и . APNOMS, стр. 1-4. IEEE, (2022)Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane., , , , , , и . APNOMS, стр. 114-119. IEEE, (2020)Miniaturized Wide-Stopband FSIW-LC Diplexer With High Selectivity and Narrow Channel Spacing., , , , и . IEEE Trans. Circuits Syst. II Express Briefs, 71 (7): 3313-3317 (июля 2024)OpenCMISS: a multi-physics & multi-scale computational infrastructure for the vph/physiome project, , , , , , , , , и 21 other автор(ы). Prog Biophys Mol Biol, 107 (1): 32--47 (2011)Event Detection from Web Data in Chinese Based on Bi-LSTM with Attention., , , , , , и . ADMA (1), том 13725 из Lecture Notes in Computer Science, стр. 93-105. Springer, (2022)Requirements for Policy Languages for Trust Negotiation., , , , , , , и . POLICY, стр. 68-79. IEEE Computer Society, (2002)Dimensions of Risk in Mobile Applications: A User Study., , , , , и . CODASPY, стр. 49-60. ACM, (2015)