From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Java mobile code security by bytecode behavior analysis., , , и . IASTED Conf. on Software Engineering and Applications, стр. 90-95. IASTED/ACTA Press, (2004)Load Estimation and Compensation Control of a Vertical Two-Link Robot., и . J. Robotics Mechatronics, 2 (2): 107-113 (1990)Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality., , , и . Int. J. Netw. Secur., 7 (3): 416-427 (2008)An integrated optimization framework for reducing the energy consumption of embedded real-time applications., , , , , , , , , и 2 other автор(ы). ISLPED, стр. 271-276. IEEE/ACM, (2011)Analyzing Invariant Condition of Running Java Program., , , и . SEKE, стр. 350-353. (2004)Identifying candidate invariant conditions of running program., , , и . IASTED Conf. on Software Engineering and Applications, стр. 577-582. IASTED/ACTA Press, (2004)Java Bytecode Dependence Analysis for Secure Information Flow., , , и . Int. J. Netw. Secur., 4 (1): 59-68 (2007)An Integrated Framework for Energy Optimization of Embedded Real-Time Applications., , , , , , , , , и 1 other автор(ы). IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (12): 2477-2487 (2014)