From post

Interpretation of Dual Peak Time Signal Measured in Network Systems.

, , и . CN, том 79 из Communications in Computer and Information Science, стр. 141-152. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The General Concept of a Distributed Computer System Designed for Monitoring Rock Movements., и . CN, том 39 из Communications in Computer and Information Science, стр. 280-291. Springer, (2009)Guest Editorial Special Section on Distributed Computer Systems in Industry., , и . IEEE Trans. Ind. Informatics, 9 (1): 181 (2013)Resilient Computer Systems Development for Cyberattacks Resistance., , , , и . IntelITSIS, том 2853 из CEUR Workshop Proceedings, стр. 353-361. CEUR-WS.org, (2021)Pessimistic Useful Efficiency of EPL Network Cycle.. CN, том 79 из Communications in Computer and Information Science, стр. 297-305. Springer, (2010)Method for identifying cyberattacks based on the use of social engineering over the phone., , , и . IntelITSIS, том 3675 из CEUR Workshop Proceedings, стр. 318-329. CEUR-WS.org, (2024)Methods of improving security and resilience of VR systems' architecture., , , и . IntelITSIS, том 3675 из CEUR Workshop Proceedings, стр. 285-304. CEUR-WS.org, (2024)Analysis of real-time systems using convolution of probability mass function., , , и . ETFA, стр. 1-4. IEEE, (2012)Interpretation of Dual Peak Time Signal Measured in Network Systems., , и . CN, том 79 из Communications in Computer and Information Science, стр. 141-152. Springer, (2010)The Approach for IoT Malware Detection Based on Opcodes Sequences Pattern Mining., , , , , , и . IDAACS, стр. 779-784. IEEE, (2021)Reliability Analysis of M2M Cyclic Data Transfer based on ad-hoc Wireless P2P Link., , и . IEEE Big Data, стр. 5048-5056. IEEE, (2023)