From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A tale of two synchronizing clocks., , , и . SenSys, стр. 239-252. ACM, (2009)Minerva: A reinforcement learning-based technique for optimal scheduling and bottleneck detection in distributed factory operations., , , и . COMSNETS, стр. 129-136. IEEE, (2018)A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks., , , и . Ad Hoc Networks, 11 (6): 1820-1835 (2013)Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks., , , , , и . CNS, стр. 91-99. IEEE, (2013)Protecting Bare-Metal Embedded Systems with Privilege Overlays., , , , , , и . IEEE Symposium on Security and Privacy, стр. 289-303. IEEE Computer Society, (2017)RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters., , и . DSN, стр. 519-530. IEEE Computer Society, (2017)XSTRESSOR : Automatic Generation of Large-Scale Worst-Case Test Inputs by Inferring Path Conditions., , , и . ICST, стр. 1-12. IEEE, (2019)ApproxNet: Content and Contention Aware Video Analytics System for the Edge., , , , , , и . CoRR, (2019)PySE: Automatic Worst-Case Test Generation by Reinforcement Learning., , , и . ICST, стр. 136-147. IEEE, (2019)PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters., , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 343-360. Springer, (2012)