From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enforcing and validating user-defined programming disciplines., , , и . PASTE, стр. 85-86. ACM, (2007)Harbormaster: Policy Enforcement for Containers., , и . CloudCom, стр. 355-362. IEEE Computer Society, (2015)Fine-Grained Access Control with Object-Sensitive Roles., , , и . ECOOP, том 5653 из Lecture Notes in Computer Science, стр. 173-194. Springer, (2009)A generic type-and-effect system., и . TLDI, стр. 39-50. ACM, (2009)End-to-End Sequential Consistency, , , , и . IEEE Micro, 99 (1): 1 (5555)JavaCOP: Declarative pluggable types for java., , , , , и . ACM Trans. Program. Lang. Syst., 32 (2): 4:1-4:37 (2010)Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild., , , и . RAID, том 8688 из Lecture Notes in Computer Science, стр. 426-446. Springer, (2014)Tactical Provenance Analysis for Endpoint Detection and Response Systems., , и . SP, стр. 1172-1189. IEEE, (2020)An Artificial Intelligence Approach for Real-Time Tuning of Weighting Factors in FCS-MPC for Power Converters., , , , , , и . IEEE Trans. Ind. Electron., 69 (12): 11987-11998 (2022)An Adversarial Approach for Explainable AI in Intrusion Detection Systems., , и . IECON, стр. 3237-3243. IEEE, (2018)