Author of the publication

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.

, , , , , and . USENIX Security Symposium, page 17-32. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The performance of nonlinear vibration control via NiTiNOL-Steel wire ropes., , , and . Commun. Nonlinear Sci. Numer. Simul., (April 2023)Modeling and Checking the Security of DIFC System Configurations., and . SafeConfig, page 21-38. Springer, (2012)Practice makes perfect: An adaptive active learning framework for image classification., , , , and . Neurocomputing, (2016)A Distributed Algorithm for Bandwidth Resource Sharing in Relay-Aided Wireless Cellular Networks: From the Perspective of Economic Equilibrium Theory., , and . Wireless Personal Communications, 82 (1): 435-449 (2015)The Design and Implementation of a Self-Healing Database System., , , , , and . J. Intell. Inf. Syst., 23 (3): 247-269 (2004)Evaluating Intrusion-Tolerant Certification Authority Systems., , and . Quality and Reliability Eng. Int., 28 (8): 825-841 (2012)Leader selection for strong structural controllability of single-integrator multi-agent systems., , and . J. Systems Science & Complexity, 30 (6): 1227-1241 (2017)On the Unambiguous Distance of Multi-Carrier Phase Ranging with Random Hopped Frequencie., , , and . CoRR, (2017)Distributed Model Predictive Control of Spatially Decoupled Systems Using Switched Cost Functions., and . CoRR, (2016)Exploiting Insurance Telematics for Fun and Profit., , , , , , , and . CoRR, (2016)