From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Steganography for Executables and Code Transformation Signatures., , , и . ICISC, том 3506 из Lecture Notes in Computer Science, стр. 425-439. Springer, (2004)A Model for Self-Modifying Code., , и . Information Hiding, том 4437 из Lecture Notes in Computer Science, стр. 232-248. Springer, (2006)Improved composite confidence mechanisms for a perceptron branch predictor., , и . J. Syst. Archit., 52 (3): 143-151 (2006)Formal virtualization requirements for the ARM architecture., , , , и . J. Syst. Archit., 59 (3): 144-154 (2013)64-bit versus 32-bit Virtual Machines for Java: Research Articles, , и . Softw. Pract. Exper., 36 (1): 1--26 (января 2006)A Detailed Study on Phase Predictors., , и . Euro-Par, том 3648 из Lecture Notes in Computer Science, стр. 571-581. Springer, (2005)Javana: a system for building customized Java program analysis tools., , , и . OOPSLA, стр. 153-168. ACM, (2006)Building Java program analysis tools using Javana., , , и . OOPSLA Companion, стр. 653-654. ACM, (2006)Protecting Your Software Updates., , и . IEEE Secur. Priv., 11 (2): 47-54 (2013)HiPEAC compilation architecture., и . MECO, стр. 13. IEEE, (2018)