From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modular design through component abstraction., , , и . CASES, стр. 202-211. ACM, (2004)CatchAll: A Robust Multivariate Intrusion Detection System for Cyber-Physical Systems using Low Rank Matrix., , и . CPSIOTSEC@CCS, стр. 47-56. ACM, (2021)Complexity of Scheduling in Synthesizing Hardware from Concurrent Action Oriented Specifications., , , и . Power-aware Computing Systems, том 07041 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)A Framework for Advanced Persistent Threat Attribution using Zachman Ontology., , , и . EICC, стр. 34-41. ACM, (2023)Static Ransomware Analysis Using Machine Learning and Deep Learning Models., , , и . ACeS, том 1347 из Communications in Computer and Information Science, стр. 450-467. Springer, (2020)Algorithms for power savings., , и . SODA, стр. 37-46. ACM/SIAM, (2003)A New Heuristic for Bad Cycle Detection Using BDDs., , , и . Formal Methods Syst. Des., 18 (2): 131-140 (2001)Analysis of scheduled Latency insensitive systems with periodic clock calculus., и . HLDVT, стр. 1-7. IEEE Computer Society, (2009)A simulation and validation tool for self-stabilizing protocols., , и . The Spin Verification System, том 32 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 153-164. DIMACS/AMS, (1996)The polynomial time decidability of simulation relations for finite processes: A HORNSAT based approach., , , и . Satisfiability Problem: Theory and Applications, том 35 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 603-641. DIMACS/AMS, (1996)