From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Perpetual Adaptation of Software to Hardware: An Extensible Architecture for Providing Code Optimization as a Central System Service, и . CoRR, (1999)The Oberon System Family., , , и . Softw. Pract. Exp., 25 (12): 1331-1366 (1995)Runtime Defense against Code Injection Attacks Using Replicated Execution., , , , и . IEEE Trans. Dependable Secur. Comput., 8 (4): 588-601 (2011)Emulating an Operating System on Top of Another.. Softw. Pract. Exp., 23 (6): 677-692 (1993)Containing the Ultimate Trojan Horse.. IEEE Secur. Priv., 5 (4): 52-56 (2007)The rewards of generating true 32-bit code.. ACM SIGPLAN Notices, 26 (1): 121-123 (1991)Safe Code - It's Not Just for Applets Anymore.. JMLC, том 2789 из Lecture Notes in Computer Science, стр. 12-22. Springer, (2003)Technological Steps toward a Software Component Industry.. Programming Languages and System Architectures, том 782 из Lecture Notes in Computer Science, стр. 259-281. Springer, (1994)Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities., , , , , и . CISIS, стр. 843-848. IEEE Computer Society, (2008)Eliminating Trust From Application Programs By Way Of Software Architecture.. Software Engineering, том P-121 из LNI, стр. 112-126. GI, (2008)