From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance of Secure Ad Hoc Sensor Networks Utilizing IEEE802.11b WEP., и . Systems Communications, стр. 68-72. IEEE Computer Society, (2005)Sensor Networks Applications Performance Measures for IEEE802.11n WiFi Security Protocols., , и . ICFNDS, стр. 31:1-31:4. ACM, (2017)On the difference equation yx+a=A + yn/yn-k with A., и . Appl. Math. Comput., 176 (1): 359-363 (2006)RRM: Robust Reward Model Training Mitigates Reward Hacking., , , , , , , , , и 8 other автор(ы). CoRR, (2024)Secure communications in wireless networks for biomedical EEG sensor networks applications. (Sécurisation des communications pour les réseaux de capteurs sans fil, application aux réseaux biomédicaux de type EEG).. University of Burgundy - Franche-Comté, France, (2018)ForumSum: A Multi-Speaker Conversation Summarization Dataset., , и . EMNLP (Findings), стр. 4592-4599. Association for Computational Linguistics, (2021)PEGASUS: Pre-training with Extracted Gap-sentences for Abstractive Summarization., , , и . ICML, том 119 из Proceedings of Machine Learning Research, стр. 11328-11339. PMLR, (2020)Performance Evaluation of Secured versus Non-Secured EIGRP Routing Protocol., , , и . Security and Management, стр. 292-297. CSREA Press, (2008)PEGASUS: Pre-training with Extracted Gap-sentences for Abstractive Summarization, , , и . (2019)On the rational difference equation yn+1=A+yn-k/yn., и . Appl. Math. Comput., 171 (2): 862-869 (2005)