From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Abnormal Activity Detection in Edge Computing: A Transfer Learning Approach., , , , , и . ICNC, стр. 107-111. IEEE, (2020)Supervised local spline embedding for medical diagnosis., , , , и . Multim. Tools Appl., 79 (21-22): 15025-15042 (2020)Energy-efficient scheduling with delay constraints for wireless sensor networks: A calculus-based perspective., , , , и . Comput. Commun., 35 (16): 1983-1993 (2012)GARD: Gender difference analysis and recognition based on machine learning., , , , , и . Array, (2022)Spatiotemporal Analysis of Developing Brain Networks., , , , , , и . Frontiers Neuroinformatics, (2018)Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering., , , , и . IPCCC, стр. 1-8. IEEE, (2020)Congestion-Aware Modeling and Analysis of Sponsored Data Plan from End User Perspective., , , , , и . IWQoS, стр. 1-11. IEEE, (2022)Distributed Gateway Placement for Cost Minimization in Wireless Mesh Networks., , , и . ICDCS, стр. 507-515. IEEE Computer Society, (2010)Weighted Restless Bandit and Its Applications., и . ICDCS, стр. 507-516. IEEE Computer Society, (2015)Broadcast capacity for wireless ad hoc networks., , , , , и . MASS, стр. 114-123. IEEE Computer Society, (2008)