Author of the publication

Modelling and analyzing the authorization and execution of video workflows.

, , , , , , , and . HiPC, page 1-10. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ELOTS: Energy-efficient local optimization time synchronization algorithm for WirelessHART networks., , , and . SysCon, page 402-406. IEEE, (2014)UBER: Combating Sandbox Evasion via User Behavior Emulators., , , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 34-50. Springer, (2019)CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation., , , , , and . Future Gener. Comput. Syst., (2022)TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation., , , , , , and . Future Gener. Comput. Syst., (July 2023)Concurrent hash tables on multicore machines: Comparison, evaluation and implications., , , , and . Future Gener. Comput. Syst., (2018)Redundant Network Traffic Elimination with GPU Accelerated Rabin Fingerprinting., , , and . IEEE Trans. Parallel Distributed Syst., 27 (7): 2130-2142 (2016)A 5 cm-Scale Piezoelectric Jetting Agile Underwater Robot., , , , , , , , , and 1 other author(s). Adv. Intell. Syst., (April 2023)Generating and Detecting Broad-Band Underwater Multiple OAMs Based on Water-Immersed Array., , , , , , , , , and 1 other author(s). IEEE Access, (2020)Dynamical behavior for stochastic lattice systems, and . Chaos, Solitons & Fractals, 27 (4): 1080--1090 (February 2006)A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks., , and . MTD@CCS, page 37-46. ACM, (2019)