From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Secure Crediting Protocol for Hybrid Cellular and Ad-Hoc Networks., , , и . ICETE (3), стр. 142-149. INSTICC Press, (2004)Repeatability, reproducibility and rigor in CS research.. PLMW@POPL, стр. 12:1. ACM, (2015)Evaluating the Design of the R Language, , , и . ECOOP'12: 26th European Conference on Object-Oriented Programming, 25, (2012)Software hardening: a research agenda., , , , и . STOP@ECOOP, стр. 58-70. ACM, (2009)STMBench7: a benchmark for software transactional memory., , и . EuroSys, стр. 315-324. ACM, (2007)Memory Management for Real-Time Java: State of the Art., и . ISORC, стр. 248-254. IEEE Computer Society, (2008)KafKa: Gradual Typing for Objects., , , и . ECOOP, том 109 из LIPIcs, стр. 12:1-12:24. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Flexible Alias Protection., , и . ECOOP, том 1445 из Lecture Notes in Computer Science, стр. 158-185. Springer, (1998)Resource Management for Safe Languages., и . ECOOP Workshops, том 2548 из Lecture Notes in Computer Science, стр. 1-14. Springer, (2002)Matchete: Paths through the Pattern Matching Jungle., , , и . PADL, том 4902 из Lecture Notes in Computer Science, стр. 150-166. Springer, (2008)