From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed Storage of Large-Scale Multidimensional Electroencephalogram Data Using Hadoop and HBase., , , , и . Grid and Cloud Database Management, Springer, (2011)Pagerank Computation and Keyword Search on Distributed Systems and P2P Networks., , , и . J. Grid Comput., 1 (3): 291-307 (2003)Guest Editorial: IEEE Transactions on Computer, Special Issue on Hardware Security., и . IEEE Trans. Computers, 72 (2): 305 (февраля 2023)Approximate graph clustering for program characterization., и . ACM Trans. Archit. Code Optim., 8 (4): 21:1-21:21 (2012)Trustworthy hardware from untrusted components., , , , и . Commun. ACM, 58 (9): 60-71 (2015)Late-binding: enabling unordered load-store queues., , , , и . ISCA, стр. 347-357. ACM, (2007)No-FAT: Architectural Support for Low Overhead Memory Safety Checks., , , , и . ISCA, стр. 916-929. IEEE, (2021)CRYLOGGER: Detecting Crypto Misuses Dynamically., , , и . SP, стр. 1972-1989. IEEE, (2021)Tamper Evident Microprocessors., и . IEEE Symposium on Security and Privacy, стр. 173-188. IEEE Computer Society, (2010)Side-channel vulnerability factor: A metric for measuring information leakage., , , и . ISCA, стр. 106-117. IEEE Computer Society, (2012)