From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building Automated Trust Negotiation architecture in virtual computing environment., , , и . J. Supercomput., 55 (1): 69-85 (2011)RT-Grid: A QoS Oriented Service Grid Framework., , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 345-348. Springer, (2004)A dynamic predictive race detector for C/C++ programs., , , , и . J. Supercomput., 73 (9): 3999-4019 (2017)An adaptive meta-scheduler for data-intensive applications., , , и . Int. J. Grid Util. Comput., 1 (1): 32-37 (2005)Theory and methodology of research on cloud security., , и . Sci. China Inf. Sci., 59 (5): 050105:1-050105:3 (2016)A Secure, Usable, and Transparent Middleware for Permission Managers on Android., , , , , и . IEEE Trans. Dependable Secur. Comput., 14 (4): 350-362 (2017)Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment., , , и . IEEE Trans. Parallel Distributed Syst., 31 (3): 695-706 (2020)Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning., , , , , и . CoRR, (2021)CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers., , , , , и . WISEC, стр. 6:1-6:6. ACM, (2015)Heterogeneous differential privacy for vertically partitioned databases., , , , и . Concurr. Comput. Pract. Exp., (2021)