From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study., , и . IEEE Access, (2017)The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors., , , , , , , , и . CoRR, (2024)On Generalizing Interrupt Handling into a Flexible Binding Model for Kernel Components., , и . ICESS, том 3605 из Lecture Notes in Computer Science, стр. 423-429. Springer, (2004)DistFL: Distribution-aware Federated Learning for Mobile Scenarios., , , , , , , и . CoRR, (2021)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , и 1 other автор(ы). CCS, стр. 2396-2410. ACM, (2023)A Lightweight Dynamic Performance Monitoring Framework for Embedded Systems., , и . ICESS, стр. 256-262. IEEE Computer Society, (2009)Automated Aspect Recommendation through Clustering-Based Fan-in Analysis., , и . ASE, стр. 278-287. IEEE Computer Society, (2008)Looxy: Web Access Optimization for Mobile Applications with a Local Proxy., , и . VTC Spring, стр. 1-5. IEEE, (2017)An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective., , , , , , и . WWW, стр. 163-172. ACM, (2017)SAConf: Semantic Attestation of Software Configurations., , и . ATC, том 5586 из Lecture Notes in Computer Science, стр. 120-133. Springer, (2009)