From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Layered Synthesis of Latent Gaussian Trees., , , и . CoRR, (2016)Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks., и . GLOBECOM, стр. 161-165. IEEE, (2007)Jamming ACK Attack to Wireless Networks and a Mitigation Approach., , , и . GLOBECOM, стр. 4966-4970. IEEE, (2008)Asymptotic converse bound for secret key capacity in hidden Markov model., , , , и . ISIT, стр. 1968-1972. IEEE, (2017)Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints., , , и . GLOBECOM, стр. 1-6. IEEE, (2015)Efficient Link Cuts in Online Social Networks., , , и . GLOBECOM, стр. 1-6. IEEE, (2015)Synthesis of Gaussian trees with correlation sign ambiguity: An information theoretic approach., , , и . Allerton, стр. 378-384. IEEE, (2016)Generic model control for hybrid energy storage system in electric vehicles., , , и . IECON, стр. 7151-7156. IEEE, (2017)TWOACK: preventing selfishness in mobile ad hoc networks., , и . WCNC, стр. 2137-2142. IEEE, (2005)The Propagation of Counteracting Information in Online Social Networks: A Case Study., , , и . ICDM Workshops, стр. 1173-1177. IEEE, (2018)