From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Big Hug: Artificial intelligence for the protection of digital societies., , , , , , , , , и 2 other автор(ы). SEPLN (Projects and Demonstrations), том 3224 из CEUR Workshop Proceedings, стр. 18-21. CEUR-WS.org, (2022)Applying Social Network Analysis to the Information in CVS Repositories, , , , и . (2004)NUBOMEDIA: The First Open Source WebRTC PaaS., , , , и . ACM Multimedia, стр. 1205-1208. ACM, (2017)Reliably Executing Tasks in the Presence of Malicious Processors., , , и . DISC, том 3724 из Lecture Notes in Computer Science, стр. 490-492. Springer, (2005)A Game Theoretic Analysis of Protocols Based on Fountain Codes., , и . ISCC, стр. 625-630. IEEE Computer Society, (2005)Analysis of Chaos-Based Coded Modulations under Intersymbol Interference., , и . J. Comput., 5 (10): 1459-1467 (2010)A Simplification of the Theory of Neural Groups Selection for Adaptive Control., , , , и . ECAL, том 929 из Lecture Notes in Computer Science, стр. 946-958. Springer, (1995)Congestion schemes and Nash equilibrium in complex networks, , , и . Physica A: Statistical Mechanics and its Applications, 355 (2-4): 602--618 (15.09.2005)Defining strategies to win in the Internet market, и . Physica A: Statistical Mechanics and its Applications, 301 (1-4): 512--534 (01.12.2001)Reliably Executing Tasks in the Presence of Untrusted Entities., , , и . SRDS, стр. 39-50. IEEE Computer Society, (2006)