From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , и . CSSE (3), стр. 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.Communication Characteristics in the NAS Parallel Benchmarks., и . IASTED PDCS, стр. 724-729. IASTED/ACTA Press, (2002)Car Plate Localization Using Modified PCNN in Complicated Environment., , и . ICIC (2), том 4114 из Lecture Notes in Computer Science, стр. 1116-1124. Springer, (2006)Inference of gene networks associated with the host response to infectious disease., , , , и . Big Data over Networks, Cambridge University Press, (2016)An Improved Image Reconstruction Algorithm., , , и . CCIS, стр. 386-389. IEEE, (2018)Generalized alternating projection based total variation minimization for compressive sensing.. ICIP, стр. 2539-2543. IEEE, (2016)Compressive video microscope via structured illumination., и . ICIP, стр. 1589-1593. IEEE, (2016)How much can sub-band virtual concatenation (VCAT) help static routing and spectrum assignment in elastic optical networks? (Invited)., и . ICCS, стр. 273-277. IEEE, (2014)A general framework for reconstruction and classification from compressive measurements with side information., , , , , и . ICASSP, стр. 4239-4243. IEEE, (2016)Compressive Imaging Via One-Shot Measurements., и . ISIT, стр. 416-420. IEEE, (2018)