From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An empirical study of data speculation use on the Intel Itanium 2 processor., , и . Interaction between Compilers and Computer Architectures, стр. 22-33. IEEE Computer Society, (2005)Efficient Detection of Bots in Subscribers' Computers., , , и . ICC, стр. 1-6. IEEE, (2009)Bayesian bot detection based on DNS traffic similarity., и . SAC, стр. 2035-2041. ACM, (2009)Evaluating the usability of usage controls in electronic collaboration., , , и . SOUPS, стр. 85-92. ACM, (2008)A Decision-Theoretic Model of Disease Surveillance and Control and a Prototype Implementation for the Disease Influenza., , , , , , , , , и . ICDE Workshops, стр. 49-54. IEEE Computer Society, (2012)A method for detecting and characterizing outbreaks of infectious disease from clinical reports., , , , , и . J. Biomed. Informatics, (2015)A method for estimating from thermometer sales the incidence of diseases that are symptomatically similar to influenza., , , , и . J. Biomed. Informatics, 46 (3): 444-457 (2013)Improving security decisions with polymorphic and audited dialogs., и . SOUPS, том 229 из ACM International Conference Proceeding Series, стр. 76-85. ACM, (2007)Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic., и . CCNC, стр. 476-481. IEEE, (2008)Using reinforcement to strengthen users' secure behaviors., и . CHI, стр. 363-372. ACM, (2010)