From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A study on appliance of role based access control model using role attributes., , , и . ICISC, стр. 189-200. Korea Institute of Information Security and Cryptology (KIISC), (1998)On a New Speech Coding Technique Using the Nonuniform Sampling and the Separated Bandwidth of Speech Signals., , и . ISSPA, стр. 13-16. IEEE, (1996)LTE-TDD interference analysis in spatial, time and frequency domain., и . ICUFN, стр. 785-787. IEEE, (2017)An efficient power allocation scheme for multiple TVWS devices based on the location probability., , и . ICUFN, стр. 22-24. IEEE, (2016)A location-probability based transmit power calculation method for hybrid TVWS devices., , и . ICTC, стр. 668-670. IEEE, (2015)Interference analysis study for coexistence between C-V2X and Wi-Fi 6E in the 6GHz band., , , и . ICAIIC, стр. 101-103. IEEE, (2022)A study on interference analysis between DVB-T2 broadcasting service and TV White Space Device., , , и . ICUFN, стр. 234-235. IEEE, (2012)A hardware-in-the-loop emulation testbed for high fidelity and reproducible network experiments., , , , и . WSC, стр. 408-418. IEEE, (2017)SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes., , , , , , , и . ACISP, том 2119 из Lecture Notes in Computer Science, стр. 177-189. Springer, (2001)Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures., , и . ICCSA (2), том 4706 из Lecture Notes in Computer Science, стр. 75-84. Springer, (2007)