From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward Provenance-Based Security for Configuration Languages., и . TaPP, USENIX Association, (2012)Formalising Configuration Languages: Why is this Important in Practice?, и . LISA, стр. 145-146. USENIX Association, (2014)Comparisons of Knowledge Graphs and Entity Extraction in Breast Cancer Subtyping Biomedical Text Analysis., , , , , , , , и . IWBBIO (2), том 13347 из Lecture Notes in Computer Science, стр. 249-259. Springer, (2022)What is Web 2.0: Ideas, technologies and implications for education. JISC, (2007)Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications., , , , , и . Middleware, том 6452 из Lecture Notes in Computer Science, стр. 212-231. Springer, (2010)Planning Configuration Relocation on the BonFIRE Infrastructure., и . CloudCom (2), стр. 164-169. IEEE Computer Society, (2013)978-0-7695-5095-4.Dynamic Reconfiguration for Grid Fabrics., и . GRID, стр. 86-93. IEEE Computer Society, (2004)SmartFrog Meets LCFG: Autonomous Reconfiguration with Central Policy Control., , и . LISA, стр. 213-222. USENIX, (2003)A Declarative Approach to Automated Configuration., , и . LISA, стр. 51-66. USENIX Association, (2012)90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications.. SCAM, стр. 3-12. IEEE Computer Society, (2008)