From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mobile Devices based Eavesdropping of Handwriting., , и . IEEE Trans. Mob. Comput., 19 (7): 1649-1663 (2020)Specification, Mapping and Control for QoS Adaptation., , , , и . Real Time Syst., 23 (1-2): 143-174 (2002)360-Video Navigation for 360-Multimedia Delivery Systems: Research Challenges and Opportunities.. ACM Multimedia, стр. 4799. ACM, (2020)Network Coding Based Schemes for Imperfect Wireless Packet Retransmission Problems: A Divide and Conquer Approach., , , , , , и . Wirel. Pers. Commun., 62 (4): 937-958 (2012)A solution to the NKR problem in end-to-end bandwidth reservation., и . ICC, стр. 1211-1215. IEEE, (2001)Link layer multi-priority frame forwarding., , и . ICC, стр. 1573-1577. IEEE, (2003)Securing peer-to-peer media streaming systems from selfish and malicious behavior., и . Middleware (Doctoral Symposium), стр. 13. ACM, (2007)Towards the understanding of human perceptual quality in tele-immersive shared activity., , , , и . MMSys, стр. 29-34. ACM, (2012)TSync: a new synchronization framework for multi-site 3D tele-immersion., , , , и . NOSSDAV, стр. 39-44. ACM, (2010)Alibi Framework for Identifying Reactive Jamming Nodes in Wireless LAN., , и . GLOBECOM, стр. 1-6. IEEE, (2011)