From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Public Telephone Network Vulnerabilities., , , , и . DBSec, том 215 из IFIP Conference Proceedings, стр. 151-164. Kluwer, (2001)On Modeling Computer Networks for Vulnerability Analysis., , , , , и . DBSec, том 256 из IFIP Conference Proceedings, стр. 233-244. Kluwer, (2002)Analyzing FD Inference in Relational Databases., и . Data Knowl. Eng., 18 (2): 167-183 (1996)Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster., , и . PEARC, стр. 5:1-5:6. ACM, (2019)Uncertainty About the Rest of the Sentence.. Cogn. Sci., 30 (4): 643-672 (2006)Secur(e/ity) Management: A Continuing Uphill Climb., и . J. Netw. Syst. Manag., 15 (4): 525-553 (2007)GridSPiM: A Framework for Simple Locality and Containment in the Stochastic pi-Calculus., , , , и . BICoB, том 5462 из Lecture Notes in Computer Science, стр. 409-423. Springer, (2009)Reranking for Sentence Boundary Detection in Conversational Speech., , , , , , , , , и 1 other автор(ы). ICASSP (1), стр. 545-548. IEEE, (2006)Transformation vs Tradition: Artificial General Intelligence (AGI) for Arts and Humanities., , , , , , , , , и 2 other автор(ы). CoRR, (2023)Systematic Redaction for Neuroimage Data., , , , и . Int. J. Comput. Model. Algorithms Medicine, 3 (2): 63-75 (2012)