From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How to Protect Personal Information against Keyloggers., , и . IMSA, стр. 275-280. IASTED/ACTA Press, (2005)Probabilistic Group Nearest Neighbors query based on Voronoi diagram., , , , и . UrbanGIS@SIGSPATIAL, стр. 36-41. ACM, (2015)Detecting bursts in P2P based semi-autonomous underwater acoustic sensor networks., и . ISCIT, стр. 238-243. IEEE, (2011)Towards selecting optimal features for flow statistical based network traffic classification., , , и . APNOMS, стр. 479-482. IEEE, (2015)Real-time detection via homography mapping of foreground polygons from multiple cameras., , , , и . ICIP, стр. 3593-3596. IEEE, (2011)A colour statistical approach to phantom pruning in multi-view detection., , и . SMC, стр. 756-761. IEEE, (2012)Cast shadow removal in motion detection by exploiting multiview geometry., , , , и . SMC, стр. 762-766. IEEE, (2012)Evapotranspiration models compared on a Sierra Nevada forest ecosystem., , , , и . Environ. Model. Softw., 20 (6): 783-796 (2005)Adaptive Carving Method for Live FLV Streaming., , , , , , , и . CollaborateCom, том 252 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 554-566. Springer, (2017)A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy Improvement., , , и . SecureComm (1), том 254 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 588-604. Springer, (2018)