From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Evaluation Architecture for a Network Coprocessor., , , и . IASTED PDCS, стр. 543-548. IASTED/ACTA Press, (2002)User identification through command history analysis., , и . CICS, стр. 19-25. IEEE, (2014)Insecurity by contract., , и . IASTED Conf. on Software Engineering and Applications, стр. 269-274. IASTED/ACTA Press, (2004)