From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks., , и . CISRC, стр. 26:1-26:4. ACM, (2016)A computational framework for spatially explicit agroecosystem modeling: Application to regional simulation., , , , , и . J. Comput. Sci., 4 (5): 386-392 (2013)Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection., , , , , , , , , и 5 other автор(ы). CoRR, (2020)Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study., , , , и . CoRR, (2017)Early experiences on Summit: Data analytics and AI applications., , , , , и . IBM J. Res. Dev., 63 (6): 2:1-2:9 (2019)Development of mpi_EPIC model for global agroecosystem modeling., , , , , , , , , и . Comput. Electron. Agric., (2015)AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors., , , , , , , , , и 4 other автор(ы). IEEE Big Data, стр. 1620-1629. IEEE, (2023)A modern solver interface to manage solution algorithms in the Community Earth System Model., , , , , , , , , и 1 other автор(ы). Int. J. High Perform. Comput. Appl., 26 (1): 54-62 (2012)High Performance Computational Chemistry: NWChem and Fully Distributed Parallel Applications., , , , , , , , , и 5 other автор(ы). PARA, том 1041 из Lecture Notes in Computer Science, стр. 278-294. Springer, (1995)Testing SOAR Tools in Use., , , , , , , , , и 4 other автор(ы). CoRR, (2022)