From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lessons Learnt in the Implementation of CMMI Maturity Level 5., , и . QUATIC, стр. 47-56. IEEE Computer Society, (2012)An Approach to Characterize the Security of Open-Source Functions using LSP., и . ISSRE, стр. 137-147. IEEE, (2023)Towards Timely ACID Transactions in DBMS., , и . DASFAA, том 4443 из Lecture Notes in Computer Science, стр. 262-274. Springer, (2007)Applying Data Mining for Detecting Anomalies in Satellites., , и . EDCC, стр. 212-217. IEEE Computer Society, (2012)Challenges of Assessing the Hypercall Interface Robustness, , , , и . The 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2015), IEEE, (июня 2015)Benchmarking Static Analysis Tools for Web Security., , , , , и . IEEE Trans. Reliability, 67 (3): 1159-1175 (2018)A Dependability Benchmark for OLTP Application Environments., и . VLDB, стр. 742-753. Morgan Kaufmann, (2003)A Hierarchical Model for Virtualized Data Center Availability Evaluation., , , и . EDCC, стр. 103-110. IEEE, (2019)Redundant Array of Inexpensive Nodes for DWS., , , и . DASFAA, том 4947 из Lecture Notes in Computer Science, стр. 580-587. Springer, (2008)Securing Data Warehouses from Web-Based Intrusions., , , и . WISE, том 7651 из Lecture Notes in Computer Science, стр. 681-688. Springer, (2012)