Author of the publication

Analyzing Execution Traces of Failed Programs for Materializing Chain of Infection.

, , , and . ACIT/CSII/BCD, page 333-339. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting contexts with house log for value-added smart TV services., , , , and . GCCE, page 258-259. IEEE, (2014)Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process., , , and . ACSW, volume 44 of CRPIT, page 145-151. Australian Computer Society, (2005)Exploiting House Log of Home Network System to Derive Contexts with Past Situations., , , , and . ICCASA, page 13-18. ACM, (2014)Considering Online Feature Interaction Detection and Resolution for Integrated Services in Home Network System., , , and . ICFI, page 191-206. IOS Press, (2009)Mission-oriented large-scale environment sensing based on analogy of military system., , , and . iiWAS, page 414-421. ACM, (2016)Visualizing and analyzing street crimes using personalized security information service PRISM., , and . iiWAS, page 208-214. ACM, (2017)Implementation and evaluation of consumer-oriented lifelog service using daily receipts., , and . iiWAS, page 337-340. ACM, (2011)Characterizing user habituation in interactive voice interface: experience study on home network system., , and . iiWAS, page 375-378. ACM, (2011)Delivering Personalized Information to Individuals in Super Smart Society., , , , and . HCI (16), volume 10286 of Lecture Notes in Computer Science, page 336-347. Springer, (2017)Generating Personalized Virtual Agent in Speech Dialogue System for People with Dementia., , , and . HCI (17), volume 10917 of Lecture Notes in Computer Science, page 326-337. Springer, (2018)