From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Qualitative Investigation of Insecure Code Propagation from Online Forums., , и . SecDev, стр. 34-48. IEEE, (2019)Scheduling Mix-flows in Commodity Datacenters with Karuna., , , и . SIGCOMM, стр. 174-187. ACM, (2016)Hierarchical cluster based evaluation system for computer courses.. Clust. Comput., 22 (Supplement): 4135-4140 (2019)A quantitative benefit evaluation of code search platform for enterprises., , , , , , и . Sci. China Inf. Sci., 63 (9): 1-3 (2020)Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study., , , и . EuroS&P Workshops, стр. 210-219. IEEE, (2020)RepFlow on node.js: Cutting Tail Latency in Data Center Networks at the Applications Layer., , , , и . CoRR, (2014)Consensus and complementary regularized non-negative matrix factorization for multi-view image clustering., , , , и . Inf. Sci., (апреля 2023)RepNet: Cutting Latency with Flow Replication in Data Center Networks., , , , , и . IEEE Trans. Serv. Comput., 14 (1): 248-261 (2021)From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging., , , , , и . WPES@CCS, стр. 119-135. ACM, (2021)Ferryman at SemEval-2020 Task 7: Ensemble Model for Assessing Humor in Edited News Headlines., , , , , и . SemEval@COLING, стр. 1008-1012. International Committee for Computational Linguistics, (2020)