From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Discovering Application-Level Insider Attacks Using Symbolic Execution., , , и . SEC, том 297 из IFIP Advances in Information and Communication Technology, стр. 63-75. Springer, (2009)Ranger: Boosting Error Resilience of Deep Neural Networks through Range Restriction., , и . CoRR, (2020)Design-Level and Code-Level Security Analysis of IoT Devices., и . ACM Trans. Embed. Comput. Syst., 18 (3): 20:1-20:25 (2019)Error Resilient Machine Learning for Safety-Critical Systems: Position Paper., , и . IOLTS, стр. 1-4. IEEE, (2020)Snowflakes at the Edge: A Study of Variability among NVIDIA Jetson AGX Xavier Boards., , , и . EdgeSys@EuroSys, стр. 1-6. ACM, (2021)Demo: OneOS - Middleware for Running Edge Computing Applications as Distributed POSIX Pipelines., , и . SEC, стр. 470-472. IEEE, (2021)Characterizing Variability in Heterogeneous Edge Systems: A Methodology & Case Study., , , , , и . SEC, стр. 107-121. IEEE, (2022)LED: Tool for Synthesizing Web Element Locators., , и . ASE, стр. 848-851. IEEE Computer Society, (2015)Understanding JavaScript event-based interactions., , , и . ICSE, стр. 367-377. ACM, (2014)Failure Analysis of Jobs in Compute Clouds: A Google Cluster Case Study., , и . ISSRE, стр. 167-177. IEEE Computer Society, (2014)