From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Personalized ranking of products using aspect-based sentiment analysis and Plithogenic sets., , и . Multim. Tools Appl., 82 (1): 1261-1287 (2023)Architectural Support for Run-Time Validation of Program Data Properties., , , и . IEEE Trans. Very Large Scale Integr. Syst., 15 (5): 546-559 (2007)Exploring Software Partitions for Fast Security Processing on a Multiprocessor Mobile SoC., , , , , и . IEEE Trans. Very Large Scale Integr. Syst., 15 (6): 699-710 (2007)INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment., , , и . ACM Trans. Embed. Comput. Syst., 11 (3): 60:1-60:20 (2012)Hardware-Assisted Run-Time Monitoring for Secure Program Execution on Embedded Processors., , , и . IEEE Trans. Very Large Scale Integr. Syst., 14 (12): 1295-1308 (2006)Formal verification of taint-propagation security properties in a commercial SoC design., и . DATE, стр. 1-2. European Design and Automation Association, (2014)Architectural support for safe software execution on embedded processors., , , и . CODES+ISSS, стр. 106-111. ACM, (2006)Software architecture exploration for high-performance security processing on a multiprocessor mobile SoC., , , , , и . DAC, стр. 496-501. ACM, (2006)Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring., , , и . DATE, стр. 178-183. IEEE Computer Society, (2005)Secure Composition for Hardware Systems (Dagstuhl Seminar 19301)., , , и . Dagstuhl Reports, 9 (7): 94-116 (2019)