From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Method for Global Attack Graph Generation., , , , и . ICNSC, стр. 236-241. IEEE, (2008)Modeling Organization of Multi-Agent System with Command Mechanism., и . IMSCCS (1), стр. 732-736. IEEE Computer Society, (2006)Research on Reliable Transport Technology of Tubular Distribution Mobile Wireless Sensor Network., , , , , и . NCM, стр. 1153-1156. IEEE Computer Society, (2009)Extending Address Space of IP Networks with Hierarchical Addressing., , , , и . Asia-Pacific Computer Systems Architecture Conference, том 3740 из Lecture Notes in Computer Science, стр. 499-508. Springer, (2005)Hierarchical Addressing in IP Networks, , , и . стр. 2109-2118. (2005)A Virtual Rhomb Grid-Based Movement-Assisted Sensor Deployment Algorithm in Wireless Sensor Networks., , и . IMSCCS (1), стр. 491-495. IEEE Computer Society, (2006)Service Discovery Protocols for MANETs: A Survey., , , , и . MSN, том 4325 из Lecture Notes in Computer Science, стр. 232-243. Springer, (2006)Research on Disaster Tolerance System Based on Network Dataflow., , , , и . CIS (1), стр. 355-360. IEEE Computer Society, (2008)An Efficient Survivability Hierarchy Analysis Model for Networked Information System., , , , и . CIS, стр. 759-762. IEEE Computer Society, (2007)A Fuzzy Set Based Trust and Reputation Model in P2P Networks., , и . IDEAL, том 3177 из Lecture Notes in Computer Science, стр. 211-217. Springer, (2004)