From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Parallel program design for JPEG compression encoding., и . FSKD, стр. 2502-2506. IEEE, (2012)Availability Analysis Method of Multilevel Security Models with Credibility Characteristics, , , и . Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on, 1, стр. 175-178. (апреля 2009)A light weight SLA management infrastructure for cloud computing., , и . CCECE, стр. 1-4. IEEE, (2013)Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem., , и . J. Comput. Sci. Technol., 22 (1): 92-94 (2007)Feature Extraction and Identification of Pipeline Intrusion Based on Phase-Sensitive Optical Time Domain Reflectometer., , , и . WISATS (1), том 280 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 665-675. Springer, (2019)Revisiting swapping in mobile systems with SwapBench., , , , , , , и . Future Gener. Comput. Syst., (2017)A Quantitative Approach for Memory Fragmentation in Mobile Systems., , , и . SmartCom, том 10135 из Lecture Notes in Computer Science, стр. 339-349. Springer, (2016)New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 253-264. Springer, (2008)Balloonfish: Utilizing morphable resistive memory in mobile virtualization., , , , , и . ASP-DAC, стр. 322-327. IEEE, (2015)P2P traffic identification and optimization using fuzzy c-means clustering., и . FUZZ-IEEE, стр. 2245-2252. IEEE, (2011)