From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting Malware Outbreaks Using a Statistical Model of Blackhole Traffic., , и . ICC, стр. 1593-1597. IEEE, (2008)Worm Detection at Network Endpoints Using Information-Theoretic Traffic Perturbations., , и . ICC, стр. 1561-1565. IEEE, (2008)On measuring memory length of the error rate process in wireless channels., и . CISS, стр. 1262-1267. IEEE, (2008)Cold-Start Recommendation with Provable Guarantees: A Decoupled Approach., , , , и . IEEE Trans. Knowl. Data Eng., 28 (6): 1462-1474 (2016)Adaptive overcomplete wavelet video coding with spatial transcaling., , и . VCIP, том 5150 из Proceedings of SPIE, стр. 489-500. SPIE, (2003)The Impact of Receive Diversity in the Presence of Correlation in Wireless Sensor Networks., и . CISS, стр. 621-626. IEEE, (2007)The Design of the Maximum-Likelihood Decoding Algorithm of LDPC Codes over BEG., и . CISS, стр. 463-468. IEEE, (2007)An Energy Efficient Link Layer Protocol for Power-Constrained Wireless Networks., , и . ICCCN, стр. 1-6. IEEE, (2011)Dictionary and Image Recovery from Incomplete and Random Measurements., и . CoRR, (2015)On realization of reliable link layer protocols with guaranteed sustainable flows for wireless communication., и . MSWiM, стр. 103-110. ACM, (2011)