From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Processor allocation and loop scheduling on multiprocessor computers., и . ICS, стр. 63-71. ACM, (1992)Generating In-Line Monitors for Rabin Automata., , и . NordSec, том 5838 из Lecture Notes in Computer Science, стр. 287-301. Springer, (2009)A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor., , , и . SEC, том 471 из IFIP Advances in Information and Communication Technology, стр. 352-366. Springer, (2016)Andrana: Quick and Accurate Malware Detection for Android., , , , , , и . FPS, том 10128 из Lecture Notes in Computer Science, стр. 20-35. Springer, (2016)From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm., , , и . WETICE, стр. 256-262. IEEE Computer Society, (1997)Estimation of Nested Loops Execution Time by Integer Arithmetic in Convex Polyhedra.. IPPS, стр. 217-221. IEEE Computer Society, (1994)Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement., , , , и . CSF, стр. 351-366. IEEE, (2019)Corrective Enforcement of Security Policies., и . Formal Aspects in Security and Trust, том 6561 из Lecture Notes in Computer Science, стр. 176-190. Springer, (2010)Enforcing Information Flow Policies by a Three-Valued Analysis., , и . MMM-ACNS, том 7531 из Lecture Notes in Computer Science, стр. 114-129. Springer, (2012)Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm., , , и . FPS, том 10128 из Lecture Notes in Computer Science, стр. 161-178. Springer, (2016)