From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Optimal Parallelization of Sorting Networks., , и . FSTTCS, том 287 из Lecture Notes in Computer Science, стр. 195-206. Springer, (1987)Computational modeling to detect software sabotage: A discussion of technical challenges and a demonstration of innovative technology.. ISSRE (Supplemental Proceedings), стр. 81. IEEE Computer Society, (2013)Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities., , , и . SCAM, стр. 79-84. IEEE Computer Society, (2016)Space and Time Efficient Parallel Algorithms and Software for EST Clustering., , и . ICPP, стр. 331-342. IEEE Computer Society, (2002)COMB: computing relevant program behaviors., , , , и . ICSE (Companion Volume), стр. 109-112. ACM, (2018)Parallel EST Clustering., , и . IPDPS, IEEE Computer Society, (2002)Generalized Linear Threshold Scheme.. CRYPTO, том 196 из Lecture Notes in Computer Science, стр. 231-241. Springer, (1984)Parallel Implementation of Hydrostatic MM5., , , и . PPSC, SIAM, (1997)A Multipath Network with Cross Links., , и . J. Parallel Distributed Comput., 5 (2): 185-193 (1988)Interactive visualization toolbox to detect sophisticated android malware., , , и . VizSEC, стр. 1-8. IEEE Computer Society, (2017)