From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guest Editorial: IEEE Transactions on Computer, Special Issue on Hardware Security., и . IEEE Trans. Computers, 72 (2): 305 (февраля 2023)Approximate graph clustering for program characterization., и . ACM Trans. Archit. Code Optim., 8 (4): 21:1-21:21 (2012)Pagerank Computation and Keyword Search on Distributed Systems and P2P Networks., , , и . J. Grid Comput., 1 (3): 291-307 (2003)Distributed Storage of Large-Scale Multidimensional Electroencephalogram Data Using Hadoop and HBase., , , , и . Grid and Cloud Database Management, Springer, (2011)The Spy in the Sandbox - Practical Cache Attacks in Javascript., , , и . CoRR, (2015)Timeloops: System Call Policy Learning for Containerized Microservices., , , и . CoRR, (2022)Trustworthy hardware from untrusted components., , , , и . Commun. ACM, 58 (9): 60-71 (2015)Scalable Hardware Memory Disambiguation for High-ILP Processors., , , , и . IEEE Micro, 24 (6): 118-127 (2004)Energy-Efficient Hybrid Analog/Digital Approximate Computation in Continuous Time., , , , , , , и . IEEE J. Solid State Circuits, 51 (7): 1514-1524 (2016)Increasing reconfigurability with memristive interconnects., , , и . ICCD, стр. 351-358. IEEE Computer Society, (2015)