From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Malware Detection Approach for Android systems Using System Call Logs., , , и . CoRR, (2017)The Kerala flood of 2018: combined impact of extreme rainfall and reservoir storage, , , , , и . Hydrology and Earth System Sciences Discussions, (сентября 2018)ITMS (Intelligent Traffic Management System)., и . SocProS (1), том 436 из Advances in Intelligent Systems and Computing, стр. 487-495. Springer, (2015)LEGO: Leveraging Experience in Roadmap Generation for Sampling-Based Planning., , , и . IROS, стр. 1488-1495. IEEE, (2019)Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure., , , и . COMSNETS, стр. 1-6. IEEE, (2020)Notes on ä password-based remote user authentication scheme without smart card"., , , и . ISBAST, стр. 116-119. IEEE, (2014)Data-driven test selection at scale., , , , , , , и . ESEC/SIGSOFT FSE, стр. 1225-1235. ACM, (2021)Rex: Preventing Bugs and Misconfiguration in Large Services Using Correlated Change Analysis., , , , , , , , и . NSDI, стр. 435-448. USENIX Association, (2020)Angelic Checking within Static Driver Verifier: Towards high-precision defects without (modeling) cost., , , , , , , , и . FMCAD, стр. 169-178. IEEE, (2020)Leakage Power Estimation for Deep Submicron Circuits in an ASIC Design Environment., и . ASP-DAC/VLSI Design, стр. 45-50. IEEE Computer Society, (2002)