From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Approximate graph clustering for program characterization., и . ACM Trans. Archit. Code Optim., 8 (4): 21:1-21:21 (2012)Guest Editorial: IEEE Transactions on Computer, Special Issue on Hardware Security., и . IEEE Trans. Computers, 72 (2): 305 (февраля 2023)Trustworthy hardware from untrusted components., , , , и . Commun. ACM, 58 (9): 60-71 (2015)Pagerank Computation and Keyword Search on Distributed Systems and P2P Networks., , , и . J. Grid Comput., 1 (3): 291-307 (2003)Distributed Storage of Large-Scale Multidimensional Electroencephalogram Data Using Hadoop and HBase., , , , и . Grid and Cloud Database Management, Springer, (2011)Increasing reconfigurability with memristive interconnects., , , и . ICCD, стр. 351-358. IEEE Computer Society, (2015)The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications., , , и . CCS, стр. 1406-1418. ACM, (2015)Side-channel vulnerability factor: A metric for measuring information leakage., , , и . ISCA, стр. 106-117. IEEE Computer Society, (2012)Continuous-time hybrid computation with programmable nonlinearities., , , , , , , и . ESSCIRC, стр. 279-282. IEEE, (2015)CRYLOGGER: Detecting Crypto Misuses Dynamically., , , и . SP, стр. 1972-1989. IEEE, (2021)