From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Empirical Study on Collaborative Writing: What Do Co-authors Do, Use, and Like?, и . Computer Supported Cooperative Work (CSCW), 13 (1): 63-89 (2004)Kluwe Academic Publishers ISSN 0925-9724.An empirical study on the user's context in mobile videoconferencing devices., , и . IHM, стр. 79-88. ACM, (2013)Presentation of uncertain information in user interfaces to support decision making in complex military systems., , и . IHM, стр. 41-48. ACM, (2008)Linear Approximation of Simple Objects., и . STACS, том 577 из Lecture Notes in Computer Science, стр. 233-244. Springer, (1992)Towards Smart Anti-Malwares for Battery-Powered Devices., , , , и . NTMS, стр. 1-4. IEEE, (2012)An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems., , и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 532-541. (2016)Mechanisms to Locate Non-cooperative Transmitters in Wireless Networks., и . ICAIT, том 7593 из Lecture Notes in Computer Science, стр. 199-212. Springer, (2012)Impact of Dataset Representation on Smartphone Malware Detection Performance., , и . IFIPTM, том 401 из IFIP Advances in Information and Communication Technology, стр. 166-176. Springer, (2013)Alertwheel: radial bipartite graph visualization applied to intrusion detection system alerts., , и . IEEE Netw., 26 (6): 12-18 (2012)Maximum distance between two sets of points in Ed.. Pattern Recognit. Lett., 14 (9): 733-735 (1993)