From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hardware Protection via Logic Locking Test Points., , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 37 (12): 3020-3030 (2018)Should Medical Schools Incorporate Formal Training in Informatics?, , и . J. Digital Imaging, 24 (1): 1-5 (2011)Self-concordance and Decomposition-based Interior Point Methods for the Two-stage Stochastic Convex Optimization Problem., и . SIAM J. Optimization, 21 (4): 1667-1687 (2011)Characterization and evaluation of TCP and UDP-based transport on real networks., , , , , , , и . Ann. des Télécommunications, 61 (1-2): 5-20 (2006)microSecEnD: A Dataset of Security-Enriched Dataflow Diagrams for Microservice Applications., , , и . MSR, стр. 125-129. IEEE, (2023)The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning., , , , , , , , , и 44 other автор(ы). CoRR, (2024)Parental involvement and students' academic achievement: A meta-analysis, и . Educational Psychology Review, 13 (1): 1--22 (сентября 2001)UNBIAS PUF: A Physical Implementation Bias Agnostic Strong PUF., , , , , и . CoRR, (2017)Scenario generation for stochastic optimization problems via the sparse grid method., , и . Comput. Optim. Appl., 62 (3): 669-692 (2015)Drive2Vec: Multiscale State-Space Embedding of Vehicular Sensor Data, , , , , и . (2018)cite arxiv:1806.04795.