From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Novel Approach for Untrusted Code Execution., , и . ICICS, том 4861 из Lecture Notes in Computer Science, стр. 398-411. Springer, (2007)JCDTA: The Data Trading Archtecture Design in JointCloud Computing., , , , , и . ICPADS, стр. 1063-1068. IEEE, (2018)A Exploratory Study of @-Mention in GitHub's Pull-Requests., , , и . APSEC (1), стр. 343-350. IEEE Computer Society, (2014)Towards High Performance and High Availability Clusters of Archived Stream., , , и . APWeb/WAIM, том 4505 из Lecture Notes in Computer Science, стр. 876-883. Springer, (2007)Policy Based Self-Adaptive Scheme in Pervasive Computing., , , , и . Wirel. Sens. Netw., 1 (1): 48-55 (2009)Harnessing the crowd wisdom for software trustworthiness.. ACM SIGSOFT Softw. Eng. Notes, 43 (1): 1-6 (2018)A SLA-Based Resource Donation Mechanism for Service Hosting Utility Center., , , , и . GCC, том 3795 из Lecture Notes in Computer Science, стр. 719-724. Springer, (2005)Enabling Imagination: Generative Adversarial Network-Based Object Finding in Robotic Tasks., , , и . ICONIP (6), том 10639 из Lecture Notes in Computer Science, стр. 100-110. Springer, (2017)DRO+: A Systemic and Economical Approach to Improve Availability of Massive Database Systems., , , , и . WISE Workshops, том 4256 из Lecture Notes in Computer Science, стр. 122-132. Springer, (2006)Attention-based Fault-tolerant Approach for Multi-agent Reinforcement Learning Systems., , , , , и . CoRR, (2019)