Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Generating Task Specific Information Extraction Systems., and . ISMIS, volume 2366 of Lecture Notes in Computer Science, page 491-502. Springer, (2002)A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast., , and . SEC, volume 250 of IFIP Conference Proceedings, page 133-144. Kluwer, (2003)desync-cc: A research tool for automatically applying disassembly desynchronization during compilation., , , , , and . Sci. Comput. Program., (June 2023)Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors., and . Digital Investigation, 5 (1-2): 29-33 (2008)Towards robust instruction-level trace alignment of binary code., and . ASE, page 342-352. IEEE Computer Society, (2017)An empirical study of human Web assistants: implications for user support in Web information systems., and . CHI, page 404-411. ACM, (2001)Final Summary Report on Enterprise Security., , , and . WETICE, page 134. IEEE Computer Society, (1999)An in-vehicle approach for improving traffic safety through GIS utilization., and . SMC (2), page 6. IEEE, (2002)Intelligent Software Delivery Using P2P., , and . Peer-to-Peer Computing, page 136-143. IEEE Computer Society, (2002)InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries., and . SCAM, page 138-143. IEEE Computer Society, (2012)