From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poster Abstract: BUFS: Towards Bottom-Up Foundational Security for Software in the Internet-of-Things., , и . SEC, стр. 107-108. IEEE Computer Society, (2016)Modularity-based community detection in large networks: An empirical evaluation., , и . ICIA, стр. 1131-1136. IEEE, (2014)Theia: Visual Signatures for Problem Diagnosis in Large Hadoop Clusters., , , , и . login Usenix Mag., (2013)Empower Text-Attributed Graphs Learning with Large Language Models (LLMs)., , , , , и . CoRR, (2023)MapTracker: Tracking with Strided Memory Fusion for Consistent Vector HD Mapping., , , , и . CoRR, (2024)Automated text categorization by generalized kernel machines., , и . ICIA, стр. 376-381. IEEE, (2014)Visual, Log-Based Causal Tracing for Performance Debugging of MapReduce Systems., , , и . ICDCS, стр. 795-806. IEEE Computer Society, (2010)AUSPICE-R: Automatic Safety-Property Proofs for Realistic Features in Machine Code., , , и . APLAS, том 10017 из Lecture Notes in Computer Science, стр. 42-62. (2016)AUSPICE: Automatic Safety Property Verification for Unmodified Executables., , , и . VSTTE, том 9593 из Lecture Notes in Computer Science, стр. 202-222. Springer, (2015)The Case for Mobile Edge-Clouds., , , , , , и . UIC/ATC, стр. 209-215. IEEE Computer Society, (2013)