From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Taiji: managing global user traffic for large-scale internet services at the edge., , , , , , , , , и 2 other автор(ы). SOSP, стр. 430-446. ACM, (2019)On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis., , , и . AISec@CCS, стр. 83-93. ACM, (2014)Optimizing distributed actor systems for dynamic interactive services., , , , , и . EuroSys, стр. 38:1-38:15. ACM, (2016)Split Null Keys: A null space based defense for pollution attacks in wireless network coding., и . SECON, стр. 479-487. IEEE, (2012)Regional unemployment and industrial restructuring in Poland, и . Discussion paper series / Forschungsinstitut zur Zukunft der Arbeit IZA, Bonn, (2000)Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques., , , и . ESSoS, том 7159 из Lecture Notes in Computer Science, стр. 106-120. Springer, (2012)Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks., и . Comput. Commun., 32 (7-10): 1233-1244 (2009)Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes., , , , и . IEEE Trans. Dependable Secur. Comput., 12 (6): 602-614 (2015)RAS: Continuously Optimized Region-Wide Datacenter Resource Allocation., , , , , , , , , и 11 other автор(ы). SOSP, стр. 505-520. ACM, (2021)Entropy attacks and countermeasures in wireless network coding., , и . WISEC, стр. 185-196. ACM, (2012)