From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security enhancements of networked control systems using RSA public-key cryptosystem., , , и . ASCC, стр. 1-6. IEEE, (2015)Realizing High Mobility through an End-to-End Network Architecture with IP Diversity Support for Real Time Internet Applications., , , , и . SAINT, стр. 243-249. IEEE Computer Society, (2004)Estimation Method of False Alarm Probability and Observation Noise Variance in Wireless Sensor Networks., , и . FUSION, стр. 1-6. IEEE, (2006)Boosting over non-deterministic ZDDs., , и . Theor. Comput. Sci., (2020)Combinatorial Online Prediction via Metarounding., , и . ALT, том 8139 из Lecture Notes in Computer Science, стр. 68-82. Springer, (2013)A 5Gb/s adaptive equalizer using filter switching., , , , , и . APCCAS, стр. 688-691. IEEE, (2008)Online Linear Optimization for Job Scheduling Under Precedence Constraints., , , и . ALT, том 9355 из Lecture Notes in Computer Science, стр. 332-346. Springer, (2015)MAT: An End-to-End Mobile Communication Architecture with Seamless IP Handoff Support for the Next Generation Internet., , , , , и . Human.Society@Internet 2003, том 2713 из Lecture Notes in Computer Science, стр. 465-475. Springer, (2003)Independence of Perception and Action for Grasping Positions., , и . ICONIP (1), том 4984 из Lecture Notes in Computer Science, стр. 1021-1030. Springer, (2007)Online Combinatorial Optimization with Multiple Projections and Its Application to Scheduling Problem., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (9): 1334-1343 (2018)