From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Specifying security policies using a graphical approach, , и . University of California,, (1999)A Compositional Approach to Concurrent Object-Oriented Programming., и . ICCL, стр. 124-135. IEEE Computer Society, (1994)CPU Resource Control for Mobile Programs., и . ASA/MA, стр. 74-89. IEEE Computer Society, (1999)Anycast-RPC for Wireless Sensor Networks., и . MASS, стр. 1-8. IEEE Computer Society, (2007)Y-Threads: Supporting Concurrency in Wireless Sensor Networks., , и . DCOSS, том 4026 из Lecture Notes in Computer Science, стр. 169-184. Springer, (2006)Using JIT Compilation and Configurable Runtime Systems for Efficient Deployment of Java Programs on Ubiquitous Devices., и . UbiComp, том 2201 из Lecture Notes in Computer Science, стр. 76-95. Springer, (2001)VMSTAR: synthesizing scalable runtime environments for sensor networks., и . SenSys, стр. 243-254. ACM, (2005)Optimizing Embedded Virtual Machines., , и . CSE (2), стр. 342-351. IEEE Computer Society, (2009)A Flexible Containment Mechanism for Executing Untrusted Code., , и . USENIX Security Symposium, стр. 207-225. USENIX, (2002)Compact body-worn MIMO antenna with high port isolation for UWB applications., , и . Int. J. Commun. Syst., (2024)