Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Face recognition using local gradient binary count pattern., , , , and . J. Electronic Imaging, 24 (6): 063003 (2015)Time and Energy Optimization Algorithms for the Static Scheduling of Multiple Workflows in Heterogeneous Computing System., , , , and . J. Grid Comput., 15 (4): 435-456 (2017)Efficiently, effectively detecting mobile app bugs with AppDoctor., , , and . EuroSys, page 18:1-18:15. ACM, (2014)Pervasive detection of process races in deployed systems., , , , , and . SOSP, page 353-367. ACM, (2011)Android Malware Static Analysis Techniques., , and . CISR, page 5:1-5:8. ACM, (2015)Tight Sublinear Convergence Rate of the Proximal Point Algorithm for Maximal Monotone Inclusion Problems., and . SIAM J. Optim., 30 (3): 1905-1921 (2020)DeepXplore: automated whitebox testing of deep learning systems., , , and . Commun. ACM, 62 (11): 137-145 (2019)Stable Deterministic Multithreading through Schedule Memoization., , , and . OSDI, page 207-221. USENIX Association, (2010)Bypassing Races in Live Applications with Execution Filters., , and . OSDI, page 135-149. USENIX Association, (2010)Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning., , , , , and . AsiaCCS, page 735-747. ACM, (2018)