From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting Database Centric Web Services against SQL/XPath Injection Attacks., , и . DEXA, том 5690 из Lecture Notes in Computer Science, стр. 271-278. Springer, (2009)The Effects of Soft Errors and Mitigation Strategies for Virtualization Servers., , , и . IEEE Trans. Cloud Comput., 10 (2): 1065-1081 (2022)Handling big dimensions in distributed data warehouses using the DWS technique., и . DOLAP, стр. 31-37. ACM, (2004)Plug and Play Fault Injector for Dependability Benchmarking., , , и . LADC, том 2847 из Lecture Notes in Computer Science, стр. 8-22. Springer, (2003)Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?, и . LADC, том 4746 из Lecture Notes in Computer Science, стр. 231-232. Springer, (2007)Open Source Software - A Recipe for Vulnerable Software, or The Only Way to Keep the Bugs and the Bad Guys Out?, и . ISSRE, стр. 347-352. IEEE Computer Society, (2003)A Functional FMECA Approach for the Assessment of Critical Infrastructure Resilience., , , и . QRS, стр. 672-681. IEEE, (2022)Efficient Compression of Text Attributes of Data Warehouse Dimensions., , и . DaWaK, том 3589 из Lecture Notes in Computer Science, стр. 356-367. Springer, (2005)Measuring lead times for failure prediction., , , и . PRDC, стр. 1-5. IEEE, (2021)Emulation of Software Faults: Representativeness and Usefulness., , и . LADC, том 2847 из Lecture Notes in Computer Science, стр. 137-159. Springer, (2003)