From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Experience with model-based performance, reliability, and adaptability assessment of a complex industrial architecture., , , , , , , , , и 5 other автор(ы). Softw. Syst. Model., 12 (4): 765-787 (2013)The design and implementation of dynamic information flow tracking systems for software security.. Stanford University, USA, (2010)Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor., , и . DSN, стр. 105-114. IEEE Computer Society, (2009)Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications., , и . USENIX Security Symposium, стр. 267-282. USENIX Association, (2009)Thread-safe dynamic binary translation using transactional memory., , , и . HPCA, стр. 279-289. IEEE Computer Society, (2008)Raksha: a flexible information flow architecture for software security., , и . ISCA, стр. 482-493. ACM, (2007)Tainting is not pointless., , и . ACM SIGOPS Oper. Syst. Rev., 44 (2): 88-92 (2010)Improving software security with a C pointer analysis., , , и . ICSE, стр. 332-341. ACM, (2005)Detecting software modularity violations., , , и . ICSE, стр. 411-420. ACM, (2011)Global demographic trends and future carbon emissions, , , , , и . Proceedings of the National Academy of Sciences, 107 (41): 17521--17526 (12.10.2010)