From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Provenance-based computing.. University of Cambridge, UK, (2019)British Library, EThOS.Improving the visualization of electron-microscopy data through optical flow interpolation., , , и . SCC, стр. 103-110. ACM, (2011)ProvMark: A Provenance Expressiveness Benchmarking System., , , , , , , и . Middleware, стр. 268-279. ACM, (2019)Structural Analysis of Whole-System Provenance Graphs., , , , , и . IPAW, том 11017 из Lecture Notes in Computer Science, стр. 241-244. Springer, (2018)Accelerating the Configuration Tuning of Big Data Analytics with Similarity-aware Multitask Bayesian Optimization., , , и . IEEE BigData, стр. 266-275. IEEE, (2020)Non-repudiable disk I/O in untrusted kernels., , , , и . APSys, стр. 24:1-24:6. ACM, (2017)To Tune or Not to Tune?: In Search of Optimal Configurations for Data Analytics., , , , и . KDD, стр. 2494-2504. ACM, (2020)IPAPI: Designing an Improved Provenance API., , , и . TaPP, USENIX Association, (2013)Towards Secure User-space Provenance Capture., , , , и . TaPP, USENIX Association, (2016)Shadow Kernels: A General Mechanism For Kernel Specialization in Existing Operating Systems., , , , и . APSys, стр. 1:1-1:7. ACM, (2015)