From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

KNOW Why your access was denied: regulating feedback for usable security., , и . CCS, стр. 52-61. ACM, (2004)CryptVMI: a flexible and encrypted virtual machine introspection system in the cloud., , и . SCC@ASIACCS, стр. 11-18. ACM, (2014)M-TEEVE: real-time 3D video interaction and broadcasting framework for mobile devices., , , и . IMMERSCOM, стр. 19. ICST/ACM, (2009)Reflective Middleware: From Your Desk to Your Hand., , и . IEEE Distributed Systems Online, (2001)A C++ Class Hierarchy for Building UNIX-like File Systems., , , и . C++ Conference, стр. 65-80. USENIX Association, (1988)Error Recovery in Asynchronous Systems., и . IEEE Trans. Software Eng., 12 (8): 811-826 (1986)Security Challenges of Reconfigurable Devices in the Power Grid., , и . Critical Infrastructure Protection, том 253 из IFIP, стр. 147-160. Springer, (2007)Addenda and Corrigenda: Formal Semantics of a Class of High-Level Primitives for Coordinating Concurrent Processes, и . Acta Inf., (1977)see: Acta Informatika 5: 297-332 (1975).Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut, , , , , и . CoRR, (2005)Communication Scheduling as a First-Class Citizen in Distributed Machine Learning Systems., , и . CoRR, (2018)