From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient and Scalable Workflows for Genomic Analyses., , , , , , и . DIDC@HPDC, стр. 27-36. ACM, (2016)Adverse Events in Robotic Surgery: A Retrospective Study of 14 Years of FDA Data., , , , и . CoRR, (2015)Preemptive intrusion detection: theoretical framework and real-world measurements., , , , и . HotSoS, стр. 5:1-5:12. ACM, (2015)Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster)., , , и . SIN, стр. 492. ACM, (2014)Live forensics for HPC systems: a case study on distributed storage systems., , , , , , , и . SC, стр. 65. IEEE/ACM, (2020)A Data-Driven Approach to Soil Moisture Collection and Prediction., , и . SMARTCOMP, стр. 1-6. IEEE Computer Society, (2016)On accelerating pair-HMM computations in programmable hardware., , , , , и . FPL, стр. 1-8. IEEE, (2017)Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants., , , , и . DSN, стр. 13-24. IEEE Computer Society, (2014)Personalized password guessing: a new security threat., , , , , и . HotSoS, стр. 22. ACM, (2014)Integrity Attacks on Real-Time Pricing in Electric Power Grids., , , и . ACM Trans. Inf. Syst. Secur., 18 (2): 5:1-5:33 (2015)