Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name SHIELD,
add a person with the name SHIELD,
 

Other publications of authors with the same name

https://shield.com/blog/5-reasons-why-mobile-apps-are-vulnerable-to-fraud-attacks. (2021)Modeling the Effect of Leadership on Crowd Flow Dynamics., and . ACRI, volume 3305 of Lecture Notes in Computer Science, page 601-621. Springer, (2004)Analysis of Kernel Effects on Optimisation Mismatch in Cache Reconfiguration., , and . FPL, page 625-628. IEEE, (2007)Contact-Implicit Trajectory Optimization using Orthogonal Collocation., , , , and . CoRR, (2018)Asymmetric Cache Coherency: Policy Modifications to Improve Multicore Performance., , and . ACM Trans. Reconfigurable Technol. Syst., 5 (3): 12:1-12:12 (2012)Dynamic Cache Switching in Reconfigurable Embedded Systems., , and . FPL, page 111-116. IEEE, (2007)Getting Air: Modelling and Control of a Hybrid Pneumatic-Electric Legged Robot., , , and . ICRA, page 9973-9979. IEEE, (2023)Genome-wide association study of classical Hodgkin lymphoma and Epstein-Barr virus status-defined subgroups., , , , , , , , , and 53 other author(s). Journal of the National Cancer Institute, 104 (3): 240--253 (Feb 8, 2012)Detecting Patching of Executables without System Calls., , , , and . CODASPY, page 185-196. ACM, (2017)Refining Object-Oriented Invariants and Dynamic Constraints., and . APSEC, page 52-. IEEE Computer Society, (2002)