From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Models of Parallel Applications with Large Computation and I/O Requirements., , , и . IEEE Trans. Software Eng., 28 (3): 286-307 (2002)Disarming offense to facilitate defense., и . NSPW, стр. 69-75. ACM, (2000)S-ARP: a Secure Address Resolution Protocol., , и . ACSAC, стр. 66-74. IEEE Computer Society, (2003)Adding Availability to Log Services of Untrusted Machines., , и . ACSAC, стр. 199-206. IEEE Computer Society, (1999)Workload Characterization For Performance Engineering Of Parallel Applications., и . PDP, стр. 457-462. IEEE, (1994)Scheduling issues in high-performance computing., , , и . SIGMETRICS Perform. Evaluation Rev., 26 (4): 60-69 (1999)L'evoluzione della sicurezza informatica: la prospettiva del CERT-IT, , и . Crimine virtuale, minaccia reale. ICT Security: politiche e strumenti di prevenzione, том 571.2.7 из FTI Forum per la tecnologia dell'informazione, FrancoAngeli, (2004)A quantitative study of Public Key Infrastructures., , и . Comput. Secur., 22 (1): 56-67 (2003)Performance evaluation of parallel systems., , , и . Parallel Comput., 25 (13-14): 1677-1698 (1999)Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues., и . Mob. Networks Appl., 7 (6): 503-511 (2002)