From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Method of Power Network Security Analysis Considering Cascading Trip., , , , и . ICGEC, том 1107 из Advances in Intelligent Systems and Computing, стр. 171-180. Springer, (2019)A Method to Prevent Cascading Trip in Power Network Based on Nodal Power., , , , и . ICGEC, том 1107 из Advances in Intelligent Systems and Computing, стр. 302-309. Springer, (2019)Integration over polytopes (abstract only)., и . ACM Conference on Computer Science, стр. 422. ACM, (1985)Instance-wise points-to analysis for loop-based dependence testing., , , и . ICS, стр. 262-273. ACM, (2002)High-Performance SAR Image Matching Using Improved SIFT Framework Based on Rolling Guidance Filter and ROEWA-Powered Feature., , , , и . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 12 (3): 920-933 (2019)A Location Privacy Preserving Method Based on Sensitive Diversity for LBS., , , , и . NPC, том 8707 из Lecture Notes in Computer Science, стр. 409-422. Springer, (2014)Position-Based User-Centric Radio Resource Management in 5G UDN for Ultra-Reliable and Low-Latency Vehicular Communications., , , и . ICC Workshops, стр. 1-6. IEEE, (2019)Replayable Execution Optimized for Page Sharing for a Managed Runtime Environment., , и . EuroSys, стр. 39:1-39:16. ACM, (2019)Segment-Based Spatial Analysis for Assessing Road Infrastructure Performance Using Monitoring Observations and Remote Sensing Data., , , , , , , и . Remote Sensing, 10 (11): 1696 (2018)Modelling and Analysis of Network Security - an Algebraic Approach., , и . CoRR, (2015)