From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Application of Computer Technology to Clinical Practice Guideline Implementation: A Scoping Review., , , , , , , , , и 1 other автор(ы). J. Medical Syst., 48 (1): 6 (декабря 2024)Identify Silent Data Corruption Vulnerable Instructions Using SVM., и . IEEE Access, (2019)Make Imbalance Useful - An Energy-Efficient Charging Scheme in Wireless Sensor Networks., , и . ICPCA/SWS, том 8351 из Lecture Notes in Computer Science, стр. 160-171. Springer, (2013)DELTA: A DEep learning based Language Technology plAtform., , , , , , , , , и 13 other автор(ы). CoRR, (2019)Schedulability decision of charging missions in wireless rechargeable sensor networks., и . SECON, стр. 450-458. IEEE, (2014)Minimizing the number of mobile chargers in a large-scale wireless rechargeable sensor network., и . WCNC, стр. 1297-1302. IEEE, (2015)Applying Bourdieu's Practice Theory to Social Commerce: toward a Dynamic Process-Oriented Research Framework., , , и . CONF-IRM, стр. 35. (2019)Reaching Consensus for SDN Multi-controller Networks., и . HCC, том 11956 из Lecture Notes in Computer Science, стр. 443-457. Springer, (2019)Predicting the Silent Data Corruption Vulnerability of Instructions in Programs., и . ICPADS, стр. 862-869. IEEE, (2019)On Data Fusion and Lifetime Constraints in Wireless Sensor Networks., , , , и . ICC, стр. 3942-3947. IEEE, (2007)