From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The use of mTags for mandatory security: a case study., , , и . Softw. Pract. Exp., 44 (12): 1511-1523 (2014)Attack Resilient Heterogeneous Vehicle Platooning Using Secure Distributed Nonlinear Model Predictive Control., , и . MED, стр. 307-312. IEEE, (2020)Energy-Efficient Multiple Producer-Consumer., , и . IEEE Trans. Parallel Distributed Syst., 30 (3): 560-574 (2019)Deep Learning for System Trace Restoration., , , и . IJCNN, стр. 1-8. IEEE, (2019)An open platform for mixed-criticality real-time ethernet., и . DATE, стр. 153-156. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Perphecy: Performance Regression Test Selection Made Simple but Effective., , , , и . ICST, стр. 103-113. IEEE Computer Society, (2017)Runtime verification of LTL on lossy traces., , и . SAC, стр. 1379-1386. ACM, (2017)Predictive Run-Time Verification of Discrete-Time Reachability Properties in Black-Box Systems Using Trace-Level Abstraction and Statistical Learning., , и . RV, том 11237 из Lecture Notes in Computer Science, стр. 187-204. Springer, (2018)Palisade: A Framework for Anomaly Detection in Embedded Systems Dataset., , , , , и . (июня 2020)A Reordering Framework for Testing Message-Passing Systems., , и . ISORC, стр. 109-116. IEEE Computer Society, (2017)