From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Finding Large H-Colorable Subgraphs in Hereditary Graph Classes., , , , и . ESA, том 173 из LIPIcs, стр. 35:1-35:17. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Key criteria for selecting a secure cloud wireless net work., и . Netw. Secur., 2016 (1): 17-20 (2016)Teaching Software Engineering Skills in CS1.5: Incorporating Real-world Practices and Tools (Abstract Only)., и . SIGCSE, стр. 696-697. ACM, (2016)Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework (Abstract Only)., , и . SIGCSE, стр. 677. ACM, (2015)Measuring the forensic-ability of audit logs for nonrepudiation.. ICSE, стр. 1419-1422. IEEE Computer Society, (2013)Finding Large H-Colorable Subgraphs in Hereditary Graph Classes., , , , и . SIAM J. Discret. Math., 35 (4): 2357-2386 (2021)Determining Viability of Deep Learning on Cybersecurity Log Analytics., , и . IEEE BigData, стр. 4806-4811. IEEE, (2018)Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings., , , , , , , , , и 1 other автор(ы). HotSoS, стр. 38-51. ACM, (2016)Combining Theory and Practice in Data Structures & Algorithms Course Projects: An Experience Report.. SIGCSE, стр. 959-965. ACM, (2021)Finding large $H$-colorable subgraphs in hereditary graph classes., , , и . CoRR, (2020)