From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attack and defense mechanisms of malicious EPC event injection in EPC discovery service., , и . RFID-TA, стр. 1-6. IEEE, (2013)Attention based deep neural network for micro-fracture extraction of sequential coal rock CT images., , , и . Multim. Tools Appl., 81 (18): 26463-26482 (2022)Evaluating the predictive power of multivariate tensor-based morphometry in Alzheimer's disease progression via convex fused sparse group Lasso., , , , , , и . Medical Imaging: Image Processing, том 9034 из SPIE Proceedings, стр. 90342L. SPIE, (2014)Data transformation and query management in personal health sensor networks., , , , , и . J. Netw. Comput. Appl., 35 (4): 1191-1202 (2012)Visual attention based image zero watermark scheme with ensemble similarity., , , и . WCSP, стр. 1-5. IEEE, (2013)Finding Motifs of Financial Data Streams in Real Time., , , , и . ISICA, том 5370 из Lecture Notes in Computer Science, стр. 546-555. Springer, (2008)A New Task Scheduling for Minimizing Completion Time and Execution Cost in Smart Grid Cloud., , , , , и . ComComAP, стр. 151-156. IEEE, (2019)A software-defined security middle platform architecture., , , , , , , и . CSSE, стр. 647-651. ACM, (2022)Adaptive Power Allocation for Multi-hop OFDM System with Non-regenerative Relaying., и . CSSE (3), стр. 1077-1080. IEEE Computer Society, (2008)978-0-7695-3336-0.Hyperbolic Ricci Flow and Its Application in Studying Lateral Ventricle Morphometry., , и . MBIA, том 7509 из Lecture Notes in Computer Science, стр. 61-76. Springer, (2012)