Author of the publication

Cross-flow vortices and their secondary instabilities in hypersonic and high-enthalpy boundary layers

, , , and . Journal of fluid mechanics, (2022)
DOI: 10.1017/jfm.2022.607

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems., , and . COMPSAC Workshops, page 376-381. IEEE Computer Society, (2010)Pushdown model checking for malware detection., and . STTT, 16 (2): 147-173 (2014)Efficient CTL model-checking for pushdown systems., and . Theor. Comput. Sci., (2014)Proactive Failure Management by Integrated Unsupervised and Semi-Supervised Learning for Dependable Cloud Systems., , and . ARES, page 83-90. IEEE Computer Society, (2011)On temporal logics with data variable quantifications: Decidability and complexity., and . Inf. Comput., (2016)Randomized load balancing strategies with churn resilience in peer-to-peer networks., , and . J. Network and Computer Applications, 34 (1): 252-261 (2011)Verifying and Quantifying Side-channel Resistance of Masked Software Implementations., , , and . ACM Trans. Softw. Eng. Methodol., 28 (3): 16:1-16:32 (2019)Model Checking Pushdown Epistemic Game Structures., , and . ICFEM, volume 10610 of Lecture Notes in Computer Science, page 36-53. Springer, (2017)auto-AID: A data mining framework for autonomic anomaly identification in networked computer systems., and . IPCCC, page 73-80. IEEE Computer Society, (2010)Quantitative Verification of Masked Arithmetic Programs Against Side-Channel Attacks., , , , and . TACAS (1), volume 11427 of Lecture Notes in Computer Science, page 155-173. Springer, (2019)