From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Coarse-Grained Reconfigurable Array Architectures., , и . Handbook of Signal Processing Systems, Springer, (2013)To Be or not to Be Cited in Computer Science, и . Communications of the ACM, 55 (8): 69--75 (августа 2012)Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)., , , и . Dagstuhl Reports, 9 (8): 1-25 (2019)Formal virtualization requirements for the ARM architecture., , , , и . J. Syst. Archit., 59 (3): 144-154 (2013)An Efficient Memory Organization for High-ILP Inner Modem Baseband SDR Processors., , , , , , и . J. Signal Process. Syst., 61 (2): 157-179 (2010)Multi-Variant Execution of Parallel Programs., , , и . CoRR, (2016)A practical interprocedural dominance algorithm., , и . ACM Trans. Program. Lang. Syst., 29 (4): 19 (2007)Attack simulation based software protection assessment method., , , , , , и . Cyber Security And Protection Of Digital Services, стр. 1-8. IEEE, (2016)Bidirectional liveness analysis, or how less than half of the Alpha's registers are used., , и . J. Syst. Archit., 52 (10): 535-548 (2006)Steganography for Executables and Code Transformation Signatures., , , и . ICISC, том 3506 из Lecture Notes in Computer Science, стр. 425-439. Springer, (2004)