From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract., , , и . ISSRE Workshops, стр. 319-320. IEEE, (2020)A cluster-based checkpointing scheme for mobile computing on wide area network., , и . Mobile Networks and Computing, том 52 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 177-193. DIMACS/AMS, (1999)Holography: A Hardware Virtualization Tool for Malware Analysis., , , , , и . PRDC, стр. 263-268. IEEE Computer Society, (2009)Event Pattern Discovery on IDS Traces of Cloud Services., , и . BDCloud, стр. 25-32. IEEE Computer Society, (2014)Dependable Architecture of RFID Middleware on Networked RFID Systems., , , , и . GreenCom/iThings/CPScom, стр. 1881-1884. IEEE, (2013)Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management., , , , , , и . LISA, стр. 33-46. USENIX, (2004)A Simple and Efficient Deadlock Recovery Scheme for Wormhole Routed 2-Dimensional Meshes., , , и . PRDC, стр. 210-217. IEEE Computer Society, (1999)Scheduling-Aware Data Prefetching for Data Processing Services in Cloud., , , и . AINA, стр. 835-842. IEEE Computer Society, (2017)Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release., , , , , , и . AINA, стр. 1130-1137. IEEE Computer Society, (2017)Computing Threshold Times for k-Resilient Protocols., , и . ICPP (2), стр. 24-27. CRC Press, (1992)