From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Period Adaptation for Continuous Security Monitoring in Multicore Real-Time Systems., , , и . CoRR, (2019)Exploring Challenges of Deploying BERT-based NLP Models in Resource-Constrained Embedded Devices., , , , и . CoRR, (2023)Social Behavior in Bacterial Nanonetworks: Challenges and Opportunities., , , и . CoRR, (2014)LLMs as On-demand Customizable Service., , , и . CoRR, (2024)System Auditing for Real-Time Systems., , , , , и . ACM Trans. Priv. Secur., 26 (4): 50:1-50:37 (ноября 2023)Random access for machine-to-machine communication in LTE-advanced networks: issues and approaches., , и . IEEE Commun. Mag., (2013)Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach., и . CoRR, (2014)Distributed resource allocation in D2D-enabled multi-tier cellular networks: An auction approach., и . ICC, стр. 2949-2954. IEEE, (2015)Towards Efficient Auditing for Real-Time Systems., , , , , и . ESORICS (3), том 13556 из Lecture Notes in Computer Science, стр. 614-634. Springer, (2022)A Design-Space Exploration for Allocating Security Tasks in Multicore Real-Time Systems., , , и . CoRR, (2017)