Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers., , , , , and . CoRR, (2024)Õ(T-1) Convergence to (Coarse) Correlated Equilibria in Full-Information General-Sum Markov Games., , , , , and . CoRR, (2024)Automated Derivation of Application-Specific Error Detectors Using Dynamic Analysis., , , , and . IEEE Trans. Dependable Secur. Comput., 8 (5): 640-655 (2011)Joint Panel - IPDS and Workshop on Dependability Benchmarking., , , , , , , , , and . DSN, IEEE Computer Society, (2002)Pervasive embedded systems for detection of traumatic brain injury., , , , , and . ICME, page 1704-1707. IEEE, (2009)A Mean-Field Game Approach to Cloud Resource Management with Function Approximation., , , , , , and . NeurIPS, (2022)BayesPerf: minimizing performance monitoring errors using Bayesian statistics., , , and . ASPLOS, page 832-844. ACM, (2021)A Software Multilevel Fault Injection Mechanism: Case Study Evaluating the Virtual Interface Architecture., , and . SRDS, page 306-307. IEEE Computer Society, (1999)A Foundation for Adaptive Fault Tolerance in Software., , and . ECBS, page 252-260. IEEE Computer Society, (2003)IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid., and . IRI, page xxx-xxxi. IEEE Computer Society, (2014)