From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks., , , и . CASoN, стр. 297-302. IEEE, (2012)Network recovery strategies for maximization of network survivability., , , и . IWCMC, стр. 1130-1134. IEEE, (2011)TetherNet Anti-NAT - Secure Internet Subnet Rental System., , и . DISCEX (2), стр. 112-. IEEE Computer Society, (2003)Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent Attackers., , , и . BWCCA, стр. 206-213. IEEE Computer Society, (2010)A 5.1Gb/s 60.3fJ/bit/mm PVT tolerant NoC transceiver., , , , , , и . A-SSCC, стр. 141-144. IEEE, (2016)Maximization of Wireless Mesh Networks Survivability to Assure Service Continuity under Intelligent Attacks., , , и . AINA, стр. 583-590. IEEE Computer Society, (2013)RoomDreaming: Generative-AI Approach to Facilitating Iterative, Preliminary Interior Design Exploration., , , , , , , , и . CHI, стр. 379:1-379:20. ACM, (2024)A 2 - 8 GHz multi-phase distributed DLL using phase insertion in 90 nm., , , , и . ISCAS, стр. 2015-2018. IEEE, (2012)A 12 Gb/s chip-to-chip AC coupled transceiver., , , , , , и . ISCAS, стр. 1692-1695. IEEE, (2011)An at-speed self-testable technique for the high speed domino adder., , , , , и . CICC, стр. 1-4. IEEE, (2011)