From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Low-power, high-throughput deblocking filter for H.264/AVC., , , , , и . SoC, стр. 93-98. IEEE, (2010)A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories., , и . ITNG, стр. 534-539. IEEE Computer Society, (2015)Guided Web Content Mining Approach for Automated Meta-Rule Extraction and Information Retrieval., и . DMIN, стр. 619-625. CSREA Press, (2008)Analyzing Engineers Writing for Non-engineers., и . TALE, стр. 281-286. IEEE, (2020)JOP-plus - A processor for efficient execution of java programs extended with GALS concurrency., , и . ASP-DAC, стр. 17-22. IEEE, (2012)High false positive detection of security vulnerabilities: a case study., , и . ACM Southeast Regional Conference, стр. 359-360. ACM, (2012)A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application., , , , , , и . IEEE Access, (2022)Memory management of safety-critical hard real-time systems designed in SystemJ., , , и . Microprocess. Microsystems, (2019)On Wide-Area Control of Solar-Integrated DAE Models of Power Grids., , и . ACC, стр. 4495-4500. IEEE, (2023)Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks., , , , , , и . Symmetry, 16 (5): 605 (мая 2024)