From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Role of Cloudlets in Hostile Environments., , , , , и . IEEE Pervasive Computing, 12 (4): 40-49 (2013)Delay-tolerant data sharing in tactical environments., , , и . MILCOM, стр. 605-610. IEEE, (2017)Adaptive location aided mobile ad hoc network routing., и . IPCCC, стр. 423-432. IEEE, (2004)Mesh-based Geocast Routing Protocols in an Ad Hoc Network., , и . IPDPS, стр. 184. IEEE Computer Society, (2001)Preparing Our Undergraduates to Enter a Cyber World., , , и . World Conference on Information Security Education, том 406 из IFIP Advances in Information and Communication Technology, стр. 123-130. Springer, (2011)Visualizing Keyboard Pattern Passwords., , , и . Inf. Vis., 10 (2): 127-133 (2011)Visualizing keyboard pattern passwords., , , и . VizSEC, стр. 69-73. IEEE Computer Society, (2009)Service-oriented architecture (SOA)concepts and implementations., и . SIGAda, стр. 3-4. ACM, (2011)Service-oriented architecture (SOA) concepts and implementations., и . HILT, стр. 11-12. ACM, (2013)Location information services in mobile ad hoc networks., , и . ICC, стр. 3318-3324. IEEE, (2002)