From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

To Snoop or Not to Snoop: Evaluation of Fine-Grain and Coarse-Grain Snoop Filtering Techniques., , , , и . Euro-Par, том 5168 из Lecture Notes in Computer Science, стр. 141-150. Springer, (2008)Does Digital Game Play Affect Social/Emotional Child Wellbeing?, , , , , и . JCSG, том 14309 из Lecture Notes in Computer Science, стр. 155-170. Springer, (2023)Confidence-Building Measures for Artificial Intelligence: Workshop Proceedings., , , , , , , , , и 13 other автор(ы). CoRR, (2023)Evaluating implications of Virtual Worlds on server architecture using Second Life., , , , и . HiPC, стр. 453-462. IEEE Computer Society, (2009)Improved Sleep Detection Through the Fusion of Phone Agent and Wearable Data Streams., , , , , , , , , и 2 other автор(ы). PerCom Workshops, стр. 1-6. IEEE, (2020)LinSched: The Linux Scheduler Simulator., , , , и . PDCCS, стр. 171-176. ISCA, (2008)Reviewing CS1 Materials through a Collaborative Software Engineering Exercise: An Experience Report.. SIGCSE, стр. 379-385. ACM, (2020)A Method for Identifying Software Requirements Based on Policy Commitments., и . RE, стр. 47-56. IEEE Computer Society, (2010)The role of data use agreements in specifying legally compliant software requirements., , , и . RELAW, стр. 1-4. IEEE Computer Society, (2011)Assessing identification of compliance requirements from privacy policies., , и . RELAW, стр. 52-61. IEEE Computer Society, (2012)