From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security through Collaboration in MANETs., , и . CollaborateCom, том 10 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 696-714. Springer / ICST, (2008)Using elastic nets for correspondence in range data., и . ICNN, стр. 1908-1913. IEEE, (1993)A declarative approach for secure and robust routing., , , и . SafeConfig, стр. 45-52. ACM, (2010)Threshold-based intrusion detection in ad hoc networks and secure AODV., , , , , и . Ad Hoc Networks, 6 (4): 578-599 (2008)A Secure Infrastructure for Service Discovery and Access in Pervasive Computing., , , , и . Mob. Networks Appl., 8 (2): 113-125 (2003)On the problem of correspondence in range data and some inelastic uses for elastic nets., и . IEEE Trans. Neural Networks, 6 (3): 716-723 (1995)Schema-free structured querying of DBpedia data., , и . CIKM, стр. 2090-2093. ACM, (2012)Simulation of a Common Access Point for Bluetooth, 802.11 and Wired LANs., , , , и . PDPTA, стр. 918-922. CSREA Press, (2002)A MultiAgent Environment for MPSE's., , , , и . PPSC, SIAM, (1997)Retriever: Improving Web Search Engine Results Using Clustering, , , и . Managing Business with Electronic Commerce: Issues and Trends, стр. 59--81. (2002)