Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dockerfile Changes in Practice: A Large-Scale Empirical Study of 4, 110 Projects on GitHub., , , and . APSEC, page 247-256. IEEE, (2020)Meta learning based audio tagging., , , , , , and . DCASE, page 193-196. (2018)HESA: The Construction and Evaluation of Hierarchical Software Feature Repository., , , , and . SEKE, page 624-631. Knowledge Systems Institute Graduate School, (2013)Intelligent Computing: The Latest Advances, Challenges and Future, , , , , , , , , and 11 other author(s). (2022)cite arxiv:2211.11281.A Trustworthy Resource Selection Approach in Grid with Fuzzy Reputation Aggregation., , and . AWIC, volume 43 of Advances in Soft Computing, page 142-147. Springer, (2007)Running stability of hydraulic confined piston engine based on virtual prototype., , , and . RAM, page 291-294. IEEE, (2011)Deep Learning-based Cooperative Trail Following for Multi-Robot System., , , and . IJCNN, page 1-8. IEEE, (2018)AT-RBAC: An Authentication Trustworthiness-Based RBAC Model., , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 343-350. Springer, (2004)Hiding "real" machine from attackers and malware with a minimal virtual machine monitor., , and . SecureComm, page 21. ACM, (2008)A Secure Virtual Execution Environment for Untrusted Code., and . ICISC, volume 4817 of Lecture Notes in Computer Science, page 156-167. Springer, (2007)