From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population., , , , , и . NSPW, стр. 11-22. ACM, (2016)Position paper: bitemporal dynamic graph analytics., и . GRADES-NDA@SIGMOD, стр. 7:1-7:12. ACM, (2021)NVIDIA Jetson Platform Characterization., , , и . Euro-Par, том 10417 из Lecture Notes in Computer Science, стр. 92-105. Springer, (2017)Characterizing Variability in Heterogeneous Edge Systems: A Methodology & Case Study., , , , , и . SEC, стр. 107-121. IEEE, (2022)Snowflakes at the Edge: A Study of Variability among NVIDIA Jetson AGX Xavier Boards., , , и . EdgeSys@EuroSys, стр. 1-6. ACM, (2021)BonVoision: leveraging spatial data smoothness for recovery from memory soft errors., , , , и . ICS, стр. 484-496. ACM, (2019)Scalable Pattern Matching in Metadata Graphs via Constraint Checking., , , , и . CoRR, (2019)Forecasting Suspicious Account Activity at Large-Scale Online Service Providers., , , , и . Financial Cryptography, том 11598 из Lecture Notes in Computer Science, стр. 569-587. Springer, (2019)There are Trillions of Little Forks in the Road. Choose Wisely! - Estimating the Cost and Likelihood of Success of Constrained Walks to Optimize a Graph Pruning Pipeline., , , , , и . IA3@SC, стр. 20-27. IEEE, (2018)An Early Warning System for Suspicious Accounts., , , , и . AISec@CCS, стр. 51-52. ACM, (2017)