From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Blockchain Approach to Identifying Compromised Nodes in Collaborative Intrusion Detection Systems., и . DASC/PiCom/CBDCom/CyberSciTech, стр. 87-93. IEEE, (2020)Application of Blockchain for Trusted Coordination in Collaborative Software Development., и . COMPSAC, стр. 1036-1040. IEEE, (2020)SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts., , , , и . IEEE Trans. Serv. Comput., 16 (5): 3665-3681 (сентября 2023)Meeting the Crisis in Computer Science., , , , , и . Commun. ACM, 26 (12): 1046-1050 (1983)Error correction in redundant residue number systems., и . IEEE Symposium on Computer Arithmetic, стр. 1-22. IEEE Computer Society, (1972)Some stability measures for software maintenance., и . COMPSAC, стр. 674-679. IEEE, (1979)Keynote Speech: Model-Driven Agile Development (MAD) for Situation-Aware Software in Ubiquitous Computing Environments.. COMPSAC (2), стр. 159. IEEE Computer Society, (2005)0-7695-2413-3.Testing Context-Sensitive Middleware-Based Software Applications., , , , и . COMPSAC, стр. 458-466. IEEE Computer Society, (2004)Design of self-checking software., и . Reliable Software, стр. 450-455. ACM, (1975)Simulation of large asynchronous logic circuits using an ambiguous gate model., и . AFIPS Fall Joint Computing Conference, том 39 из AFIPS Conference Proceedings, стр. 651-661. AFIPS / ACM, (1971)