From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Join Query Optimization Techniques for Complex Event Processing Applications., и . CoRR, (2018)Lazy evaluation methods for detecting complex events., , и . DEBS, стр. 34-45. ACM, (2015)Memory Efficient All-Solutions SAT Solver and Its Application for Reachability Analysis., , и . FMCAD, том 3312 из Lecture Notes in Computer Science, стр. 275-289. Springer, (2004)3-Valued Circuit SAT for STE with Automatic Refinement., , и . ATVA, том 4762 из Lecture Notes in Computer Science, стр. 457-473. Springer, (2007)Real-Time Multi-Pattern Detection over Event Streams., и . SIGMOD Conference, стр. 589-606. ACM, (2019)Collecting Garbage Pages in a Distributed Shared Memory with Reduced Memory and Communication Overhead., и . ESA, том 1284 из Lecture Notes in Computer Science, стр. 308-325. Springer, (1997)Achieving Speedups in Distributed Symbolic Reachability Analysis Through Asynchronous Computation., , , и . CHARME, том 3725 из Lecture Notes in Computer Science, стр. 129-145. Springer, (2005)Distributed Symbolic Model Checking for µ-Calculus., , и . Formal Methods Syst. Des., 26 (2): 197-219 (2005)Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect Malwares., , и . CSCML, том 10879 из Lecture Notes in Computer Science, стр. 227-242. Springer, (2018)Privacy-Preserving Distributed Stream Monitoring., , , и . NDSS, The Internet Society, (2014)