From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

One optimized I/O configuration per HPC application: leveraging the configurability of cloud., , , , и . APSys, стр. 15. ACM, (2011)Visual tracking using sequential importance sampling with a state partition technique., , , , и . ICIP (3), стр. 876-879. IEEE, (2005)Target Tracking using a Particle Filter Based on the Projection Method., , и . ICASSP (3), стр. 1189-1192. IEEE, (2007)A novel nonlinear state estimation technique based on sequential importance sampling and parallel filter banks., и . CCA, стр. 1606-1611. IEEE, (2005)Image restoration using a hybrid combination of particle filtering and wavelet denoising., , , , и . ICIP (2), стр. 790-793. IEEE, (2005)Employing Checkpoint to Improve Job Scheduling in Large-Scale Systems., , , , , , и . JSSPP, том 7698 из Lecture Notes in Computer Science, стр. 36-55. Springer, (2012)Reasoning About Complementary Intrusion Evidence., , , и . ACSAC, стр. 39-48. IEEE Computer Society, (2004)Integrating IDS Alert Correlation and OS-Level Dependency Tracking., , и . ISI, том 3975 из Lecture Notes in Computer Science, стр. 272-284. Springer, (2006)HaPPy: Hyperthread-aware Power Profiling Dynamically., , , , и . USENIX ATC, стр. 211-217. USENIX Association, (2014)Automatic diagnosis and response to memory corruption vulnerabilities., , , , и . CCS, стр. 223-234. ACM, (2005)