From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Noise insensitive demosaicing algorithm., , , , , и . SIP, стр. 422-427. IASTED/ACTA Press, (2007)Machine learning-based software classification scheme for efficient program similarity analysis., , , , , и . RACS, стр. 114-118. ACM, (2015)Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation., , , , , и . RACS, стр. 148-152. ACM, (2016)A Static Birthmark of Windows Binary Executables Based on Strings., , , , , , и . IMIS, стр. 734-738. IEEE Computer Society, (2013)Measuring similarity of android applications via reversing and K-gram birthmarking., , , , , , , и . RACS, стр. 336-341. ACM, (2013)An anti-piracy mechanism based on class separation and dynamic loading for Android applications., , , , , и . RACS, стр. 328-332. ACM, (2012)Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems., и . EUC Workshops, том 4097 из Lecture Notes in Computer Science, стр. 755-764. Springer, (2006)Energy Consumption Optimization of Real-Time Embedded Systems., , , , , , и . ICESS, стр. 281-287. IEEE Computer Society, (2009)RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks., , , , , , и . LEET, USENIX Association, (2012)An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots., , , , и . RACS, стр. 266-271. ACM, (2011)