From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Into the depths of C: elaborating the de facto standards., , , , , , и . PLDI, стр. 1-15. ACM, (2016)A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities., , , , , и . SP, стр. 370-385. IEEE, (2022)CHERI JNI: Sinking the Java Security Model into the C., , , , , , , , , и 5 other автор(ы). ASPLOS, стр. 569-583. ACM, (2017)CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment., , , , , , , , , и 11 other автор(ы). ASPLOS, стр. 379-393. ACM, (2019)Adaptive Infrastructure for Visual Computing., , , , , , , , , и 1 other автор(ы). TPCG, стр. 147-156. Eurographics Association, (2007)CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization., , , , , , , , , и 5 other автор(ы). IEEE Symposium on Security and Privacy, стр. 20-37. IEEE Computer Society, (2015)Cornucopia: Temporal Safety for CHERI Heaps., , , , , , , , , и 14 other автор(ы). SP, стр. 608-625. IEEE, (2020)Secure Compilation (Dagstuhl Seminar 21481)., , , и . Dagstuhl Reports, 11 (10): 173-204 (2021)Autonomic visualisation.. Swansea University, UK, (2007)British Library, EThOS.CheriRTOS: A Capability Model for Embedded Devices., , , , , , , , , и 6 other автор(ы). ICCD, стр. 92-99. IEEE Computer Society, (2018)