From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed Storage of Large-Scale Multidimensional Electroencephalogram Data Using Hadoop and HBase., , , , и . Grid and Cloud Database Management, Springer, (2011)Pagerank Computation and Keyword Search on Distributed Systems and P2P Networks., , , и . J. Grid Comput., 1 (3): 291-307 (2003)Guest Editorial: IEEE Transactions on Computer, Special Issue on Hardware Security., и . IEEE Trans. Computers, 72 (2): 305 (февраля 2023)Approximate graph clustering for program characterization., и . ACM Trans. Archit. Code Optim., 8 (4): 21:1-21:21 (2012)Trustworthy hardware from untrusted components., , , , и . Commun. ACM, 58 (9): 60-71 (2015)CRYLOGGER: Detecting Crypto Misuses Dynamically., , , и . SP, стр. 1972-1989. IEEE, (2021)Tamper Evident Microprocessors., и . IEEE Symposium on Security and Privacy, стр. 173-188. IEEE Computer Society, (2010)Late-binding: enabling unordered load-store queues., , , , и . ISCA, стр. 347-357. ACM, (2007)No-FAT: Architectural Support for Low Overhead Memory Safety Checks., , , , и . ISCA, стр. 916-929. IEEE, (2021)The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications., , , и . CCS, стр. 1406-1418. ACM, (2015)