From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mechanisms for outsourcing computation via a decentralized market., , , , и . DEBS, стр. 61-72. ACM, (2020)Minimizing Energy Use of Mixed-Fleet Public Transit for Fixed-Route Service., , , , , и . CoRR, (2020)The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox., , , , и . WWW, стр. 2209-2219. ACM, (2023)PoolParty: Efficient Blockchain-Agnostic Decentralized Mining Pool., и . ICBCT, стр. 20-27. ACM, (2021)Resilient observation selection in adversarial settings., , и . CDC, стр. 7416-7421. IEEE, (2015)The Rules of Engagement for Bug Bounty Programs., , , и . Financial Cryptography, том 10957 из Lecture Notes in Computer Science, стр. 138-159. Springer, (2018)Plasma Go: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces., , , , , и . CoRR, (2020)Economic Analyses of Security Investments on Cryptocurrency Exchanges., , , и . CoRR, (2019)Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks., , и . WINE, том 8289 из Lecture Notes in Computer Science, стр. 319-332. Springer, (2013)A Game-Theoretic Approach for Alert Prioritization., , , , и . AAAI Workshops, том WS-17 из AAAI Technical Report, AAAI Press, (2017)