From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting Spatial Locality and Heterogeneity of Agents for Search and Rescue Teamwork., , , и . J. Field Robotics, 33 (7): 877-900 (2016)On intrusion detection and response for mobile ad hoc networks., , , и . IPCCC, стр. 747-752. IEEE, (2004)Balboa: Bobbing and Weaving around Network Censorship., , и . USENIX Security Symposium, стр. 3399-3413. USENIX Association, (2021)Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It., , , , , и . USENIX Security Symposium, стр. 109-126. USENIX Association, (2020)Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities., , , , и . USENIX Security Symposium, стр. 6525-6540. USENIX Association, (2023)Verifying replicated data types with typeclass refinements in Liquid Haskell., , , , , и . Proc. ACM Program. Lang., 4 (OOPSLA): 216:1-216:30 (2020)A 60GHz CMOS phased-array transceiver pair for multi-Gb/s wireless communications., , , , , , , , , и 2 other автор(ы). ISSCC, стр. 164-166. IEEE, (2011)Tasks with cost growing over time and agent reallocation delays., и . AAMAS, стр. 381-388. IFAAMAS/ACM, (2014)Advanced Language-based Techniques for Correct, Secure Networked Systems.. University of Maryland, College Park, MD, USA, (2020)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/26387).Distributed Multi-Level Recovery in Main-Memory Databases., , , , , и . PDIS, стр. 44-55. IEEE Computer Society, (1996)