Search for persons
X
?
2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM) ,
1
Automated Customized Bug-Benchmark Generation:
, In:
?
Proceedings of the 2014 SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems ,
2
How to compute worst-case execution time by optimization mo..:
, In:
?
Cooperative Information Systems; Lecture Notes in Computer Science ,
3
Random-Value Payment Tokens for On-Chain Privacy-Preserving..:
, In:
?
2022 IEEE/ACM Sixth International Workshop on Software Correctness for HPC Applications (Correctness) ,
4
Proposed Consistent Exception Handling for the BLAS and LAP..:
, In:
?
Service-Oriented Computing; Lecture Notes in Computer Science ,
5
Trustworthy Cross-Organizational Collaborations with Hybrid..:
, In:
?
2020 IEEE/MTT-S International Microwave Symposium (IMS) ,
6
Long-Range Zero-Power Multi-Sensing in Industrial Environme..:
, In:
?
Medical Image Computing and Computer Assisted Intervention – MICCAI 2020; Lecture Notes in Computer Science ,
7
Weakly Supervised Multiple Instance Learning Histopathologi..:
, In:
?
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications ,
9
Impact of pseudonym subsequent pre-computation and forwardi..:
, In:
?
Proceedings of the 21st International Conference on World Wide Web ,
10
Turning a Web 2.0 social network into a Web 3.0, distribute..:
, In:
?
2021 IEEE/CVF International Conference on Computer Vision (ICCV) ,
14
Time-Multiplexed Coded Aperture Imaging: Learned Coded Aper..:
, In:
?
Mille homicides en Afrique de l'Ouest ,
15