Author of the publication

Design of Security Training System for Individual Users.

, , and . Wirel. Pers. Commun., 90 (3): 1105-1120 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Security Training System for Individual Users., , and . Wirel. Pers. Commun., 90 (3): 1105-1120 (2016)Order-of-Demand Analysis for Lazy Languages., and . Inf. Process. Lett., 55 (6): 343-348 (1995)Human decision-substitutable chemometric identification of pixel shrinkage in OLEDs using secondary ion mass spectrometry., , , , , , , , , and . Expert Syst. Appl., 238 (Part E): 122207 (March 2024)Reference Escape Analysis: Optimizing Reference Counting based on the Lifetime of References., and . PEPM, page 178-189. ACM, (1991)Higher Order Escape Analysis: Optimizing Stack Allocation in Functional Program Implementations., and . ESOP, volume 432 of Lecture Notes in Computer Science, page 152-160. Springer, (1990)Escape Analysis on Lists., and . PLDI, page 116-127. ACM, (1992)Order-of-Demand Analysis for Lazy Languages., and . WSA, volume 81-82 of Series Bigre, page 91-101. Atelier Irisa, IRISA, Campus de Beaulieu, (1992)Fault Diagnosis of Bit-Slice Processor, and . ISCA, page 166-172. ACM, (1983)