From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An inheritance-based technique for building simulation proofs incrementally., , , и . ICSE, стр. 478-487. ACM, (2000)A Wide Area Network Simulation of Single-Round Group Membership Algorithms., и . NCA, стр. 159-170. IEEE Computer Society, (2005)Parsing with Prefix and Suffix Dictionaries., и . Data Compression Conference, стр. 180-189. IEEE Computer Society, (1996)Using Leader-Based Communication to Improve the Scalability of Single-Round Group Membership Algorithms., и . IPDPS, IEEE Computer Society, (2005)A Virtually Synchronous Group Multicast Algorithm for WANs: Formal Approach., и . SIAM J. Comput., 32 (1): 78-130 (2002)Practical Principle of Least Privilege for Secure Embedded Systems., , , , , , , , , и . RTAS, стр. 1-13. IEEE, (2021)Leveraging Intel SGX Technology to Protect Security-Sensitive Applications., , , и . NCA, стр. 1-5. IEEE, (2018)Multicast Group Communication as a Base for a Load-Balancing Replicated Data Service., , и . DISC, том 1499 из Lecture Notes in Computer Science, стр. 258-272. Springer, (1998)An inheritance-based technique for building simulation proofs incrementally., , , и . ACM Trans. Softw. Eng. Methodol., 11 (1): 63-91 (2002)Guest Editorial: Special Issue on Hardware Solutions for Cyber Security., , и . J. Hardw. Syst. Secur., 3 (3): 199 (2019)