From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using Reference Counters in Update-Based Coherent Memory., и . PARLE, том 817 из Lecture Notes in Computer Science, стр. 805-808. Springer, (1994)Where's Wally?: How to Privately Discover your Friends on the Internet., , , и . AsiaCCS, стр. 425-430. ACM, (2018)The Network RamDisk: Using remote memory on heterogeneous NOWs., и . Clust. Comput., 2 (4): 281-293 (1999)On using network RAM as a non-volatile buffer., , , и . Clust. Comput., 2 (4): 295-303 (1999)Emulation-Based Detection of Non-self-contained Polymorphic Shellcode., , и . RAID, том 4637 из Lecture Notes in Computer Science, стр. 87-106. Springer, (2007)Towards a decentralized infrastructure for data marketplaces: narrowing the gap between academia and industry., , , и . DE@CoNEXT, стр. 49-56. ACM, (2022)Real-world polymorphic attack detection using network-level emulation., , и . CSIIRW, стр. 21:1-21:3. ACM, (2008)REAPER: Real-time App Analysis for Augmenting the Android Permission System., , , , и . CODASPY, стр. 37-48. ACM, (2019)Towards a Realistic Decentralized Naive Bayes with Differential Privacy., , , и . ICSBT/SECRYPT (Revised Selected Papers), том 1849 из Communications in Computer and Information Science, стр. 98-121. Springer, (2022)User-Level DMA without Operating System Kernel Modification., и . HPCA, стр. 322-331. IEEE Computer Society, (1997)