From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Crash Analysis and Exploit Generation with Extendable Exploit Model., , , , , и . DSC, стр. 71-78. IEEE, (2022)Memory System Design for a Multi-core Processor., , , , , , и . CISIS, стр. 601-606. IEEE Computer Society, (2008)Towards QoS-Aware Cloud Live Transcoding: A Deep Reinforcement Learning Approach., , , , и . ICME, стр. 670-675. IEEE, (2019)Understanding Performance of Edge Prefetching., , , , и . MMM (1), том 10132 из Lecture Notes in Computer Science, стр. 527-539. Springer, (2017)PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph., , , , и . QRS, стр. 537-548. IEEE, (2022)A Survey of Cloudlet Based Mobile Computing., , , , и . CCBD, стр. 268-275. IEEE Computer Society, (2015)CP-operated dash caching via reinforcement learning., , , , и . ICME, стр. 487-492. IEEE Computer Society, (2017)Tiyuntsong: A Self-Play Reinforcement Learning Approach for ABR Video Streaming., , , , , и . ICME, стр. 1678-1683. IEEE, (2019)Hierarchical memory system design for a heterogeneous multi-core processor., , , , , , и . SAC, стр. 1504-1508. ACM, (2008)Automated Vulnerability Discovery System Based on Hybrid Execution., , , , , и . DSC, стр. 234-241. IEEE, (2022)