From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Brief Announcement: Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems., , , и . DISC, том 4167 из Lecture Notes in Computer Science, стр. 554-556. Springer, (2006)BlockSim: Blockchain Simulator., и . Blockchain, стр. 439-446. IEEE, (2019)Randomization can be a healer: consensus with dynamic omission failures., , , и . Distributed Comput., 24 (3-4): 165-175 (2011)Specification-based Intrusion Detection System for Carrier Ethernet., , и . WEBIST (1), стр. 426-429. INSTICC Press, (2007)Integrated Dymanic QoS Control for Multimedia Applications., , , и . SYBEN, том 3408 из SPIE Proceedings, стр. 384-394. SPIE, (1998)Solving Vector Consensus with a Wormhole., , и . IEEE Trans. Parallel Distributed Syst., 16 (12): 1120-1131 (2005)Securing energy metering software with automatic source code correction., , и . INDIN, стр. 701-706. IEEE, (2013)DEKANT: a static analysis tool that learns to detect web application vulnerabilities., , и . ISSTA, стр. 1-11. ACM, (2016)Automatic detection and correction of web application vulnerabilities using data mining to predict false positives., , и . WWW, стр. 63-74. ACM, (2014)A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection., и . IWANN (1), том 10305 из Lecture Notes in Computer Science, стр. 432-446. Springer, (2017)