From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey., , и . SECRYPT, стр. 77-85. SciTePress, (2010)Modeling the Interaction between Emergency Communications and Behavior in the Aftermath of a Disaster., , , , , , , и . SBP, том 7812 из Lecture Notes in Computer Science, стр. 476-485. Springer, (2013)Approximation Algorithms for Reducing the Spectral Radius to Control Epidemic Spread., , , и . CoRR, (2015)Password Security through Negative Filtering., и . EST, стр. 83-89. IEEE Computer Society, (2010)Containing Cascading Failures in Networks: Applications to Epidemics and Cybersecurity.. Virginia Tech, Blacksburg, VA, USA, (2016)base-search.net (ftvirginiatec:oai:vtechworks.lib.vt.edu:10919/82711).Clearing secondary spectrum market with spatio-temporal partitioning., , , , , и . DySPAN, стр. 358-367. IEEE, (2012)Analysis of policy instruments for enhanced competition in spectrum auction., , , , , и . DySPAN, стр. 89-96. IEEE, (2012)Modeling cellular network traffic with mobile call graph constraints., , , , , и . WSC, стр. 3170-3182. IEEE, (2011)A biologically inspired password authentication system., и . CSIIRW, стр. 41. ACM, (2009)Equilibria in Epidemic Containment Games., , и . AAAI, стр. 777-783. AAAI Press, (2014)